1) An example of social engineering. a) Viruses b) Worms c) Phishing d) Trojan horses 2) User access levels means that a) Anyone can update software to the latest version. b) Passwords must be shared with the network manager. c) Hackers can never gain access to the system. d) Areas of a system can be limited to certain users only. 3) Malware a) A type of threat to computer systems. b) Is a manufacturer of computer parts. c) Are hard to find on the internet. d) Distribution is completely legal. 4) A virus is a ... a) program which runs hardware and software. b) a program that can replicate itself. c) a type of social engineering. d) type of operating system stored in the BIOS. 5) Trojan horse a) Does not need to attach to a program. b) Can only occur when a computer is not connected to a network. c) A type of social engineering. d) Pretends to be a genuine program so that a user will run it. 6) What can viruses affect? a) Keyboard b) Hard drive c) RAM d) All the above 7) Why might someone try to hack a computer? a) To make a computer unusable b) To get someone’s personal information c) To find out card details d) All of the above 8) Sending requests to a single server using hijacked machines is called: a) Phishing b) DDOS c) Worm d) Virus 9) Data travels across networks in a) Parcels b) Parts c) Bit rates d) Packets 10) What form of attack sends many and repeated requests to a server in order to bring it offline a) SQL b) DDOS c) USB d) WLAN 11) Organisations can protect themselves from SQL injection attacks by a) Using locked server rooms b) Only using wired connections c) Penetration Testing d) Hiring security guards 12) An effect of SQL injection a) Full access to the target computer b) Network access to the computer only c) Ability to edit all files d) Attackers can manipulate data in the database 13) An SQL injection attack would give the attacker unauthorised access to a) Network settings b) Emails c) A database d) Hardware 14) A network of computers infected with malicious software and controlled as part of a group without the owners’ knowledge to commit a DDOS attack is called a: a) Penetration testing b) Packet Tracing c) Defragmentation d) System backup and restoration 15) A type of hacker who does so for good reasons, with permission a) Black hat b) Grey hat c) Red hat d) White hat 16) A method used to prevent physical access to the system a) Encryption b) Biometric door lock c) Firewall d) Anti-Malware 17) What features might give away a phishing email? a) Poor spelling b) A hyperlink to a login page c) Generic welcome message, not personalised d) All of the above 18) A user gaining access to a system or intercepting user data without permission would be breaching which law? a) Data Protection Act b) Regulation of Investigatory Powers Act (RIPA) c) Investigatory Powers Act d) Computer Misuse Act 19) Software that monitors internal and external network connections on a computer between a potential attacker and the computer system a) Anti-virus b) Firewall c) Windows Update d) Disk Defragmenter 20) These define access permissions for a user a) Email box size b) Network and hardware settings c) User Maintenance d) Group and User Settings 21) Which of these would help to increase security on a computer system? a) Use password complexity rules b) Require two-factor authentication c) Limit of the number of password guesses d) All of the above 22) What is encryption? a) Securely deleting messages so that they cannot be read b) A method of bypassing viruses c) A form of anti-virus d) Where data is translated into code so that only authorised users, or users with the key can decrypt it 23) What must a user need to decrypt a file? a) Coin b) Key c) Token d) Graph 24) A Caeser cipher uses what in order for decryption? a) Token shift b) Graph token c) Shift key number d) Coin number 25) What would most students on a school network usually be able to access? a) Access to all network b) Full access c) Access to personal documents and the internet d) Access to all printers
0%
Network Security
공유
공유
공유
만든이
Srae4
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?