IGCSE Comp Sci - Security revision

Quiz
•
Computers
•
9th - 11th Grade
•
Medium
Mykhailo Shapkin
Used 29+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is
Malicious code installed to redirect users to a fake website
A way of gaining illegal access to a computer system
Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor
Malicious code installed to redirect users to a fake website
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus in comp sci context is
A form of encryption requiring both a public and a private key
A thing that makes your computer cough
Program code that can replicate/copy itself with the intention of
deleting/corrupting data/files or causing the computer to malfunction
Malicious code installed to redirect users to a fake website
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing is
Sending legitimate-looking emails to encourage users to give out personal data
The editing of program source code so that it can be exploited or changed for a specific purpose
Playing fishing games on a PC professionally
Used to verify that data comes from a trusted source
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pharming is
Pieces of data which allow detection of web pages viewed by a user and store their preferences
A way of gaining illegal access to a computer system
Playing farming games on a PC semi-professionally
Malicious code installed to redirect users to a fake website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shareware is
Software that a user can download free of charge and use for free forever, no caveats
Software that user can try out for free for a trial period
Used to verify that data comes from a trusted source
Part of Ukrainian national dress (for real though, sounds very similar)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Symmetric encryption is
A form of encryption requiring both a public and a private key
A set of principles set out to regulate use of computers
A way of gaining illegal access to a computer system
A form of encryption using one private key for both sender and recipient
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware / key-logging software is
Software that gathers data by monitoring key presses on user's keyboards
A form of encryption requiring both a public and a private key
Malicious code installed to redirect users to a fake website
Secret type of software that only spies can use
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
The Internet: Encryption & Public Keys (watch vid first)

Quiz
•
10th Grade
10 questions
Encryption 2

Quiz
•
8th - 10th Grade
11 questions
BTEC DIT: Revision 1-6

Quiz
•
1st - 12th Grade
10 questions
BTEC DIT C3 LAB - Device Hardening & Encryption

Quiz
•
10th - 11th Grade
14 questions
Cyber Security - Social Engineering

Quiz
•
10th - 11th Grade
10 questions
Unit 10 AP CSP Advanced

Quiz
•
9th - 12th Grade
9 questions
OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

Quiz
•
11th Grade - University
12 questions
CSP I: Unit 8: Lesson 9: Protecting Data Part 2

Quiz
•
9th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade