
Computer Security Risks and Protections
Authored by Yosua Febris
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lola is concerned about risks to her computer when using the Internet. For the risk: Computer virus. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.
Install and regularly update antivirus software to scan for, detect, and quarantine malicious programs before they can run
Turn on a firewall to block all outgoing traffic so no files can be downloaded from any website
Encrypt the hard drive so files cannot be read without a decryption key, even if the device is powered on
Use a pop-up blocker to stop advertisements from appearing in the web browser
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lola is concerned about risks to her computer when using the Internet. For the risk: Hacking. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.
Enable a firewall to filter network traffic and block unauthorised connections from the Internet
Run antivirus scans only after installing new applications to detect infected installers
Defragment the hard drive so files are stored in contiguous blocks and open faster
Schedule automatic cloud backups so copies of files are stored offsite
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lola is concerned about risks to her computer when using the Internet. For the risk: Spyware. Identify one security method she could use and choose the option that best describes how it helps protect her computer. Each security method must be different across risks.
Use anti-spyware tools to detect, block, and remove software that monitors activity or captures data
Encrypt outgoing email so messages cannot be intercepted and read while in transit
Install a hardware firewall to prevent electrical surges reaching the computer
Update the printer driver so documents print with higher fidelity and fewer errors
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A law company requires employees to enter a username and a password to log in. Each password must be 8 letters. The company wants to increase the security of the log-in system. Select two improvements that would make the log-in system more secure and are appropriate for this scenario.
Enforce strong passwords that use a longer minimum length with a mix of letters, numbers and symbols
Introduce two-factor authentication such as a one-time code from an authenticator app or SMS
Increase the length of usernames while keeping passwords the same
Allow shared accounts so teams can log in with the same credentials
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An art gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art on its website. Which description best explains the SSL process and how it provides a secure connection?
The browser and server complete a handshake that verifies the server’s digital certificate, agrees on encryption, and then encrypts the session using keys established during the handshake
The server hides pages from search engines and blocks unknown IP addresses so attackers cannot find the site
The client sends its MAC address to the server, which encrypts the password and stores it in a cookie for future logins
The website is compressed to reduce size and therefore attackers cannot read the data while it is being transmitted
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The art gallery also uses a firewall. Statement: Firewalls are only available as hardware devices. Indicate whether the statement is true or false.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The art gallery also uses a firewall. Statement: Firewalls allow a user to set rules for network traffic. Indicate whether the statement is true or false.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
KUIS BIOS
Quiz
•
10th Grade
46 questions
Siskomdig Hardware-Software
Quiz
•
10th Grade
42 questions
How the Internet Works
Quiz
•
9th - 12th Grade
42 questions
Bài 1: Máy tính và em
Quiz
•
1st Grade - University
40 questions
PAS SIMKOMDIG SEMESTER GENAP
Quiz
•
10th Grade
40 questions
Kuiz Komputer Online
Quiz
•
6th - 10th Grade
40 questions
Introdução ao Pensamento Computacional
Quiz
•
10th Grade
45 questions
Computer memory
Quiz
•
10th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade