IT security

IT security

11th Grade

25 Qs

quiz-placeholder

Similar activities

1.5 System Software

1.5 System Software

10th - 11th Grade

20 Qs

Understanding Computer Hardware

Understanding Computer Hardware

8th Grade - University

20 Qs

Software - Types of software and interrupts

Software - Types of software and interrupts

11th Grade - University

20 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

Computer Systems

Computer Systems

11th Grade

20 Qs

BTEC DIT A1 - Modern Technologies

BTEC DIT A1 - Modern Technologies

9th - 11th Grade

20 Qs

Component 3: A1 Modern Technologies

Component 3: A1 Modern Technologies

10th - 11th Grade

20 Qs

Computer Components

Computer Components

9th - 11th Grade

20 Qs

IT security

IT security

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Noha Mowafi

Used 37+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why users should lock their computer when leaving their desk?

To prevent unauthorized access to data

To prevent a waste of electricity

To prevent data from getting corrupted

To prevent the computer from malfunctioning

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes the term social engineering?

Accepting a friend request on a social networking site

Setting up a web page so customers can order online

Using deception to gain information

Obtaining confidential information through authorized means

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is a characteristic of information security?

Creativity

Clarity

Compatibility

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identity theft happens when someone impersonates you and uses your personal details to carry out fraud. Which of the following is a consequences of identity theft?

You may suffer financial loss

Your desktop security will no longer work

Your cached internet files will be deleted

You will need to change identity

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not likely to be a malicious threat to data?

External organization

Service Providers

Individuals

Biometrics

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following could be effect of disabling macro security setting on your computer?

Files containing macros from outside sources cannot be opened

The computer will notify the user when a file contain a macro

Files containing macros from outside sources can be opened

The computer firewall and anti-virus protection will not work

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is the term used for malicious program ?

Computer software

Computer Virus

Hardware

Adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?