IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Website Navigation Basics Quiz

Website Navigation Basics Quiz

10th Grade

14 Qs

Ad hoc networks DigitalIT2021

Ad hoc networks DigitalIT2021

9th - 10th Grade

15 Qs

11.5.5 - TestOut PcPro v7.0: Wireless Security Factsheet

11.5.5 - TestOut PcPro v7.0: Wireless Security Factsheet

10th Grade

15 Qs

Understanding AppSheet: Advantages and Disadvantages

Understanding AppSheet: Advantages and Disadvantages

11th Grade

11 Qs

Network Security Y8 Starter

Network Security Y8 Starter

9th Grade

15 Qs

ARQ, Check Digit and Encryption Reading Quiz

ARQ, Check Digit and Encryption Reading Quiz

9th Grade

10 Qs

Midterm Review 4

Midterm Review 4

11th Grade

15 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Mykhailo Shapkin

Used 29+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Malicious code installed to redirect users to a fake website

A way of gaining illegal access to a computer system

Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor

Malicious code installed to redirect users to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus in comp sci context is

A form of encryption requiring both a public and a private key

A thing that makes your computer cough

Program code that can replicate/copy itself with the intention of

deleting/corrupting data/files or causing the computer to malfunction

Malicious code installed to redirect users to a fake website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

Sending legitimate-looking emails to encourage users to give out personal data

The editing of program source code so that it can be exploited or changed for a specific purpose

Playing fishing games on a PC professionally

Used to verify that data comes from a trusted source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming is

Pieces of data which allow detection of web pages viewed by a user and store their preferences

A way of gaining illegal access to a computer system

Playing farming games on a PC semi-professionally

Malicious code installed to redirect users to a fake website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shareware is

Software that a user can download free of charge and use for free forever, no caveats

Software that user can try out for free for a trial period

Used to verify that data comes from a trusted source

Part of Ukrainian national dress (for real though, sounds very similar)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is

A form of encryption requiring both a public and a private key

A set of principles set out to regulate use of computers

A way of gaining illegal access to a computer system

A form of encryption using one private key for both sender and recipient

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware / key-logging software is

Software that gathers data by monitoring key presses on user's keyboards

A form of encryption requiring both a public and a private key

Malicious code installed to redirect users to a fake website

Secret type of software that only spies can use

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?