Securing data and systems

Securing data and systems

7th Grade

58 Qs

quiz-placeholder

Similar activities

ASAT GOOGLE DOCS,SHEETS,SLIDE

ASAT GOOGLE DOCS,SHEETS,SLIDE

7th Grade

60 Qs

HTML

HTML

4th Grade - University

63 Qs

01 - IC3 GS6 LV1 - CĐ1 - CĂN BẢN VỀ CÔNG NGHỆ

01 - IC3 GS6 LV1 - CĐ1 - CĂN BẢN VỀ CÔNG NGHỆ

7th Grade

58 Qs

TIN6_ÔN TẬP HKI_2425

TIN6_ÔN TẬP HKI_2425

6th Grade - University

60 Qs

CIW Prep Complete

CIW Prep Complete

7th - 8th Grade

57 Qs

INFORMATIKA BAB 3 - APLIKASI PERKANTORAN

INFORMATIKA BAB 3 - APLIKASI PERKANTORAN

7th Grade

58 Qs

La carcasa y la fuente de alimentación

La carcasa y la fuente de alimentación

6th - 12th Grade

64 Qs

Google Sheets/Charts & Graphs

Google Sheets/Charts & Graphs

7th - 8th Grade

60 Qs

Securing data and systems

Securing data and systems

Assessment

Passage

Computers

7th Grade

Practice Problem

Medium

Created by

ICT Pentrehafod

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a computer virus?

To steal personal information

To delete data on the computer

To replicate itself and attach to files

To enhance computer performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Spyware

Antivirus

Trojans

Keyloggers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is designed to collect data without the user's knowledge?

Viruses

Spyware

Worms

Firewalls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common accidental cause of data loss?

Installing new software

Leaving a storage device on public transport

Regular data backups

Using antivirus programs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of computer security?

A) A method of securing computer networks

B) Influencing people psychologically to reveal personal or confidential information

C) A software tool used to protect data

D) A type of computer hardware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing commonly used for?

A) To improve website security

B) To create a backup of personal data

C) To direct users to a fake website to gather personal or confidential information

D) To increase internet speed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a 'brute force' attack involve?

A) Sending spam emails to users

B) Repeatedly trying combinations of characters in usernames and passwords

C) Installing antivirus software

D) Monitoring network traffic

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers