Securing data and systems

Securing data and systems

7th Grade

58 Qs

quiz-placeholder

Similar activities

Excel - Eng+Vie - Sort & Filter + Min + Max + Average

Excel - Eng+Vie - Sort & Filter + Min + Max + Average

7th Grade

59 Qs

Microsoft Windows 10

Microsoft Windows 10

1st Grade - Professional Development

61 Qs

Key Functional Components

Key Functional Components

5th - 9th Grade

58 Qs

Year 8 - Mid Term Assessment

Year 8 - Mid Term Assessment

7th - 9th Grade

60 Qs

Quizz-Latihan Soal PAT TIK-Gr6

Quizz-Latihan Soal PAT TIK-Gr6

6th Grade - University

60 Qs

RB-1 CH-1-4-5-6 for April 2023

RB-1 CH-1-4-5-6 for April 2023

6th - 8th Grade

60 Qs

ICDL Module 1 - Computer & Online Essentials QRG 1

ICDL Module 1 - Computer & Online Essentials QRG 1

7th Grade

61 Qs

LATIHAN 61 SOAL

LATIHAN 61 SOAL

7th Grade

61 Qs

Securing data and systems

Securing data and systems

Assessment

Passage

Computers

7th Grade

Medium

Created by

ICT Pentrehafod

Used 3+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a computer virus?

To steal personal information

To delete data on the computer

To replicate itself and attach to files

To enhance computer performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Spyware

Antivirus

Trojans

Keyloggers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is designed to collect data without the user's knowledge?

Viruses

Spyware

Worms

Firewalls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common accidental cause of data loss?

Installing new software

Leaving a storage device on public transport

Regular data backups

Using antivirus programs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of computer security?

A) A method of securing computer networks

B) Influencing people psychologically to reveal personal or confidential information

C) A software tool used to protect data

D) A type of computer hardware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing commonly used for?

A) To improve website security

B) To create a backup of personal data

C) To direct users to a fake website to gather personal or confidential information

D) To increase internet speed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a 'brute force' attack involve?

A) Sending spam emails to users

B) Repeatedly trying combinations of characters in usernames and passwords

C) Installing antivirus software

D) Monitoring network traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?