AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Network Security Basics

Network Security Basics

10th Grade

15 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Hackers and Malware

Hackers and Malware

8th Grade

15 Qs

Shell Cyber Threats Quiz

Shell Cyber Threats Quiz

8th Grade

16 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

Year 9 - Cybersecurity

Year 9 - Cybersecurity

6th - 8th Grade

15 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

Assessment

Quiz

Computers

8th - 10th Grade

Medium

Created by

Mr Ling-Winston

Used 62+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for social engineering ?
Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems.
The act of building social relationships
The act of engineering society to greater heights
The strengthening of societies to prevent malicious activities online
Pluto

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for malicious code?
A program from an external source which is used for malicious activities
Hostile code
Code created to steal information
Code from an external source

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for weak passwords?
A password which can be easily compromised by brute forcing possible augmentations of charachters
A password that can be easily guessed
A password consisting of a single type of charachter, often forming a word.
A password that has become compromised

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for strong passwords?
A password that would take a long time (on average) to compromise through attempting different augmentations of charachters
A password that is hard to guess
A password consisting of multiple charachter types that do not form a single word.
A password that only the user knows

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for misconfigured access rights?
A case in which a person does not have / has access to data they should / should not have
A case in which someone gains access to some data
A case in which someone has compromised a system to retrieve data.
The case when someone made a mistake setting up an account

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for removable media?
A store of data that can be removed from the computer such as USBs
A removable add on to a computer
Software that can be deleted
A storage device such as a USB stick or disc drive

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for unpatched software?
Software which has bugs that require fixing
Software that has bugs
Software that requires an update
Software that has later versions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?