Search Header Logo

AQA GCSE Computer Science - 3.6.1 Security Terminology

Authored by Mr Ling-Winston

Computers

8th - 10th Grade

Used 65+ times

AQA GCSE Computer Science - 3.6.1 Security Terminology
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for social engineering ?

Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems.
The act of building social relationships
The act of engineering society to greater heights
The strengthening of societies to prevent malicious activities online
Pluto

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for malicious code?

A program from an external source which is used for malicious activities
Hostile code
Code created to steal information
Code from an external source

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for weak passwords?

A password which can be easily compromised by brute forcing possible augmentations of charachters
A password that can be easily guessed
A password consisting of a single type of charachter, often forming a word.
A password that has become compromised

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for strong passwords?

A password that would take a long time (on average) to compromise through attempting different augmentations of charachters
A password that is hard to guess
A password consisting of multiple charachter types that do not form a single word.
A password that only the user knows

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for misconfigured access rights?

A case in which a person does not have / has access to data they should / should not have
A case in which someone gains access to some data
A case in which someone has compromised a system to retrieve data.
The case when someone made a mistake setting up an account

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for removable media?

A store of data that can be removed from the computer such as USBs
A removable add on to a computer
Software that can be deleted
A storage device such as a USB stick or disc drive

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for unpatched software?

Software which has bugs that require fixing
Software that has bugs
Software that requires an update
Software that has later versions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?