It Security

It Security

5th Grade

26 Qs

quiz-placeholder

Similar activities

Computer Lab Rules

Computer Lab Rules

4th - 6th Grade

24 Qs

Code.org App Lab

Code.org App Lab

3rd - 9th Grade

25 Qs

Computer Quiz Competition for Grade 5

Computer Quiz Competition for Grade 5

5th Grade

24 Qs

Informatyka, klasa 4, rozdział 1

Informatyka, klasa 4, rozdział 1

4th - 5th Grade

27 Qs

On Tap Phan A_lop5 phan 1

On Tap Phan A_lop5 phan 1

5th Grade

22 Qs

COMMUNICATION USING E-MAIL

COMMUNICATION USING E-MAIL

4th - 7th Grade

22 Qs

MS-PowerPoint

MS-PowerPoint

5th Grade

22 Qs

Google Sheets Basic Vocabulary

Google Sheets Basic Vocabulary

5th - 12th Grade

23 Qs

It Security

It Security

Assessment

Quiz

Computers

5th Grade

Practice Problem

Medium

Created by

Daryl Schembri

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes spam?

Gathering information about a person or organisation without their knowledge.

Performing an unauthorised, usually malicious, action such as erasing files.

Putting unnecessary load on the network by making copies of files.

Sending unwanted bulk messages.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following can protect a computer from the risk of unwanted emails?

Anti-spam software

Anti-virus software

Anti-spyware software

PC diagnostic software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses

Maintaining regularly updated anti-virus software

Opening only virus-checked file attachments from known sources

Using a USB Flash Drive from an unknown source to exchange data

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known viruses

To ensure the software identifies old viruses

To protect your computer from unwanted bulk messages

To prevent the spread of malicious programs on the Internet

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes what you should do if you receive a chain letter email?

Forward the email

Download it onto your system

Delete the email

Send a read receipt

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes a computer hacker?

A skilled programmer who uses authorised access to exploit information available on a computer

A skilled programmer who secretly invades computers without authorisation

A skilled programmer who writes programs to train new employees

A skilled programmer who helps in the installation of new software for an organisation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions

To prevent destruction of a computer in the event of a fire

To enable easy downloading of data from web sites

To detect and disable viruses already on a computer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?