Search Header Logo

Computer Security Risks and Protections

Authored by Yosua Febris

Computers

10th Grade

Used 1+ times

Computer Security Risks and Protections
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lola is concerned about risks to her computer when using the Internet. For the risk: Computer virus. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.

Install and regularly update antivirus software to scan for, detect, and quarantine malicious programs before they can run

Turn on a firewall to block all outgoing traffic so no files can be downloaded from any website

Encrypt the hard drive so files cannot be read without a decryption key, even if the device is powered on

Use a pop-up blocker to stop advertisements from appearing in the web browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lola is concerned about risks to her computer when using the Internet. For the risk: Hacking. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.

Enable a firewall to filter network traffic and block unauthorised connections from the Internet

Run antivirus scans only after installing new applications to detect infected installers

Defragment the hard drive so files are stored in contiguous blocks and open faster

Schedule automatic cloud backups so copies of files are stored offsite

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lola is concerned about risks to her computer when using the Internet. For the risk: Spyware. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.

Use anti-spyware tools to detect, block, and remove software that monitors activity or captures data

Encrypt outgoing email so messages cannot be intercepted and read while in transit

Install a hardware firewall to prevent electrical surges reaching the computer

Update the printer driver so documents print with higher fidelity and fewer errors

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A law company requires employees to enter a username and a password to log in. Each password must be 8 letters. The company wants to increase the security of the log-in system. Select two improvements that would make the log-in system more secure and are appropriate for this scenario.

Enforce strong passwords that use a longer minimum length with a mix of letters, numbers and symbols

Introduce two-factor authentication such as a one-time code from an authenticator app or SMS

Increase the length of usernames while keeping passwords the same

Allow shared accounts so teams can log in with the same credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An art gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art on its website. Which description best explains the SSL process and how it provides a secure connection?

The browser and server complete a handshake that verifies the server’s digital certificate, agrees on encryption, and then encrypts the session using keys established during the handshake

The server hides pages from search engines and blocks unknown IP addresses so attackers cannot find the site

The client sends its MAC address to the server, which encrypts the password and stores it in a cookie for future logins

The website is compressed to reduce size and therefore attackers cannot read the data while it is being transmitted

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The art gallery also uses a firewall. Statement: Firewalls are only available as hardware devices. Indicate whether the statement is true or false.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The art gallery also uses a firewall. Statement: Firewalls allow a user to set rules for network traffic. Indicate whether the statement is true or false.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?