Search Header Logo

It Security

Authored by Daryl Schembri

Computers

5th Grade

Used 6+ times

It Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes spam?

Gathering information about a person or organisation without their knowledge.

Performing an unauthorised, usually malicious, action such as erasing files.

Putting unnecessary load on the network by making copies of files.

Sending unwanted bulk messages.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following can protect a computer from the risk of unwanted emails?

Anti-spam software

Anti-virus software

Anti-spyware software

PC diagnostic software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses

Maintaining regularly updated anti-virus software

Opening only virus-checked file attachments from known sources

Using a USB Flash Drive from an unknown source to exchange data

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known viruses

To ensure the software identifies old viruses

To protect your computer from unwanted bulk messages

To prevent the spread of malicious programs on the Internet

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes what you should do if you receive a chain letter email?

Forward the email

Download it onto your system

Delete the email

Send a read receipt

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes a computer hacker?

A skilled programmer who uses authorised access to exploit information available on a computer

A skilled programmer who secretly invades computers without authorisation

A skilled programmer who writes programs to train new employees

A skilled programmer who helps in the installation of new software for an organisation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions

To prevent destruction of a computer in the event of a fire

To enable easy downloading of data from web sites

To detect and disable viruses already on a computer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?