File Protection & Online Services

File Protection & Online Services

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

CNS_Final Quiz

CNS_Final Quiz

Professional Development

20 Qs

IT ENGLISH: Research Project Topics - Digital ID

IT ENGLISH: Research Project Topics - Digital ID

Professional Development

10 Qs

Network Plus Pre Assessment

Network Plus Pre Assessment

Professional Development

15 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Chapter 7

Chapter 7

Professional Development

20 Qs

City & Guilds Level 3 Apprenticeship Coding and Logic

City & Guilds Level 3 Apprenticeship Coding and Logic

Professional Development

20 Qs

File Protection & Online Services

File Protection & Online Services

Assessment

Quiz

Computers

Professional Development

Hard

Created by

M E

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anti-virus software uses a pattern that can be compared to programs on your hard disk to identify viruses. What is this known as?

Heuristic Detection

Firewall Detection

Finger-Print Detection

Signature Detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In anti-virus terms, what is real-time protection?

On access scanning of all files opened.

Full scans initiated on demand

Scheduled scans that run at a set time of the day

Heuristic scans that detect certain virus behaviour.

Answer explanation

Real-time protection is the name commonly used for on access scanning of all files opened, including documents & programs

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are disadvantages of using anti-virus software?

It only detects viruses, not other types of malware

It must be regularly maintained and updated

Productivity can be impaired due to program blocking.

It can slow down PC and network performance

Answer explanation

Anti-virus software must be regularly maintained and updated for the latest viruses and it can slow down PC and network performance. It can also lead to complacency but doesn’t offer total protection.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls monitor network traffic and blocks any traffic that it deems suspicious. However what is the major technique it uses for doing this?

Firewall Filtering

Heuristic Filtering

Packet Filtering

Signature Filtering

Answer explanation

Packet filtering is where the firewall inspects each packet of data and compares it to pre-defined security rules (known as the firewall policy, or ruleset). If the packet is flagged by the rules then it is prevented from passing through the firewall.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are disadvantages of using hardware firewalls?

It must be regularly maintained and updated with the latest definitions

It can diminish the performance of the network, particularly if poorly configured.

It can diminish the performance of the PC, particularly if poorly configured.

They cannot prevent internal attacks from within the network

Answer explanation

Firewalls can diminish the performance of the network and it cannot prevent internal attacks from within the network. Hardware firewalls won’t affect PC performance (though software firewalls can have some impact).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption is used for data during transmission?

Symmetric Encryption

Asymmetric Encryption

Private-Key Encryption

Firewall Encryption

Answer explanation

We encrypt data in transit using asymmetric encryption. This is commonly known as public-key encryption. With asymmetric encryption we use different keys to encrypt and decrypt the data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are disadvantages of symmetric encryption?

If you lose the encryption key then you will never be able to decrypt your data.

It has a major impact on computer processing power, causing the device to crash.

It requires a different key to encrypt and decrypt the data.

It can only use 32-bit encryption keys which are easy to crack.

Answer explanation

If you lose the encryption key then you will never be able to decrypt your data. Also, the sharing of the encryption key can compromise security as the key could be intercepted

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?