WJEC ICT - Chapter 3 - Data Protection Methods

WJEC ICT - Chapter 3 - Data Protection Methods

10th Grade

20 Qs

quiz-placeholder

Similar activities

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

TIK VII YT, GC, VIDCOF

TIK VII YT, GC, VIDCOF

7th - 12th Grade

20 Qs

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

CSP Unit 13 Practice Test

CSP Unit 13 Practice Test

9th - 12th Grade

15 Qs

Hardware and Components

Hardware and Components

5th - 11th Grade

19 Qs

2nd Monthlly Summative Test Computer 10

2nd Monthlly Summative Test Computer 10

10th Grade

20 Qs

History of Computers

History of Computers

6th - 12th Grade

15 Qs

Bài 11. Tệp và quản lý tệp

Bài 11. Tệp và quản lý tệp

10th Grade

20 Qs

WJEC ICT - Chapter 3 - Data Protection Methods

WJEC ICT - Chapter 3 - Data Protection Methods

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Jordan Firth

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "real-time protection" mean in the context of anti-malware software?

Predict future malware attacks

Scanning the system once

Automatic and continuous monitoring for threats as they happen

Removing detected malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does physical security refer to?

Protecting physical assets and facilities from unauthorized access or harm

Protecting against natural disasters

Protecting against cyber threats

Protecting data and information stored on electronic devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method uses two different keys - public and private keys?

Symmetric encryption

Hashing

Asymmetric encryption

One-time pad encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of anti-malware software?

To protect against malicious software

To improve system performance

To prevent data breaches

To enhance internet speed

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which user access level typically has the highest level of privileges in a system?

Guest

Administrator

Power User

Standard User

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a technique where an attacker tries many different password combinations to gain unauthorised access?

Denial of Service (DoS)

Phishing

Spoofing

Brute force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication is commonly used to unlock smartphones using facial recognition?

Token-based authentication

Biometric authentication

Behavioural authentication

Two-factor authentication (2FA)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?