1) An example of social engineering. a) Viruses b) Worms c) Phishing d) Trojan horses 2) User access levels means that  a) Anyone can update software to the latest version. b) Passwords must be shared with the network manager. c) Hackers can never gain access to the system. d) Areas of a system can be limited to certain users only. 3) Malware a) A type of threat to computer systems. b) Is a manufacturer of computer parts. c) Are hard to find on the internet. d) Distribution is completely legal. 4) A virus is a ... a) program which runs hardware and software. b) a program that can replicate itself. c) a type of social engineering. d) type of operating system stored in the BIOS. 5) Trojan horse a) Does not need to attach to a program. b) Can only occur when a computer is not connected to a network. c) A type of social engineering. d) Pretends to be a genuine program so that a user will run it. 6) What can viruses affect? a) Keyboard b) Hard drive c) RAM d) All the above 7) Why might someone try to hack a computer? a) To make a computer unusable b) To get someone’s personal information c) To find out card details d) All of the above 8) Sending requests to a single server using hijacked machines is called: a) Phishing b) DDOS c) Worm d) Virus 9) Data travels across networks in a) Parcels b) Parts c) Bit rates d) Packets 10) What form of attack sends many and repeated requests to a server in order to bring it offline a) SQL b) DDOS c) USB d) WLAN 11) Organisations can protect themselves from SQL injection attacks by a) Using locked server rooms b) Only using wired connections c) Penetration Testing d) Hiring security guards 12) An effect of SQL injection a) Full access to the target computer b) Network access to the computer only c) Ability to edit all files d) Attackers can manipulate data in the database 13) An SQL injection attack would give the attacker unauthorised access to a) Network settings b) Emails c) A database d) Hardware 14) A network of computers infected with malicious software and controlled as part of a group without the owners’ knowledge to commit a DDOS attack is called a: a) Penetration testing b) Packet Tracing c) Defragmentation d) System backup and restoration 15) A type of hacker who does so for good reasons, with permission a) Black hat b) Grey hat c) Red hat d) White hat 16) A method used to prevent physical access to the system a) Encryption b) Biometric door lock c) Firewall d) Anti-Malware 17) What features might give away a phishing email? a) Poor spelling b) A hyperlink to a login page c) Generic welcome message, not personalised d) All of the above 18) A user gaining access to a system or intercepting user data without permission would be breaching which law? a) Data Protection Act b) Regulation of Investigatory Powers Act (RIPA) c) Investigatory Powers Act d) Computer Misuse Act 19) Software that monitors internal and external network connections on a computer between a potential attacker and the computer system a) Anti-virus b) Firewall c) Windows Update d) Disk Defragmenter 20) These define access permissions for a user  a) Email box size b) Network and hardware settings c) User Maintenance d) Group and User Settings 21) Which of these would help to increase security on a computer system? a) Use password complexity rules b) Require two-factor authentication c) Limit of the number of password guesses d) All of the above 22) What is encryption? a) Securely deleting messages so that they cannot be read b) A method of bypassing viruses c) A form of anti-virus d) Where data is translated into code so that only authorised users, or users with the key can decrypt it 23) What must a user need to decrypt a file? a) Coin b) Key c) Token d) Graph 24) A Caeser cipher uses what in order for decryption? a) Token shift b) Graph token c) Shift key number d) Coin number 25) What would most students on a school network usually be able to access? a) Access to all network b) Full access c) Access to personal documents and the internet d) Access to all printers

לוח תוצאות מובילות

סגנון חזותי

אפשרויות

החלף תבנית

האם לשחזר את הנתונים שנשמרו באופן אוטומטי: ?