Search Header Logo

IT security

Authored by Noha Mowafi

Computers

11th Grade

Used 37+ times

IT security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why users should lock their computer when leaving their desk?

To prevent unauthorized access to data

To prevent a waste of electricity

To prevent data from getting corrupted

To prevent the computer from malfunctioning

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes the term social engineering?

Accepting a friend request on a social networking site

Setting up a web page so customers can order online

Using deception to gain information

Obtaining confidential information through authorized means

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is a characteristic of information security?

Creativity

Clarity

Compatibility

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft happens when someone impersonates you and uses your personal details to carry out fraud. Which of the following is a consequences of identity theft?

You may suffer financial loss

Your desktop security will no longer work

Your cached internet files will be deleted

You will need to change identity

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not likely to be a malicious threat to data?

External organization

Service Providers

Individuals

Biometrics

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following could be effect of disabling macro security setting on your computer?

Files containing macros from outside sources cannot be opened

The computer will notify the user when a file contain a macro

Files containing macros from outside sources can be opened

The computer firewall and anti-virus protection will not work

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is the term used for malicious program ?

Computer software

Computer Virus

Hardware

Adware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?