1) An example of social engineering. a) Viruses b) Worms c) Phishing d) Trojan horses 2) User access levels means that a) Anyone can update software to the latest version. b) Passwords must be shared with the network manager. c) Hackers can never gain access to the system. d) Areas of a system can be limited to certain users only. 3) Malware a) A type of threat to computer systems. b) Is a manufacturer of computer parts. c) Are hard to find on the internet. d) Distribution is completely legal. 4) A virus is a ... a) program which runs hardware and software. b) a program that can replicate itself. c) a type of social engineering. d) type of operating system stored in the BIOS. 5) Trojan horse a) Does not need to attach to a program. b) Can only occur when a computer is not connected to a network. c) A type of social engineering. d) Pretends to be a genuine program so that a user will run it. 6) What can viruses affect? a) Keyboard b) Hard drive c) RAM d) All the above 7) Why might someone try to hack a computer? a) To make a computer unusable b) To get someone’s personal information c) To find out card details d) All of the above 8) Sending requests to a single server using hijacked machines is called: a) Phishing b) DDOS c) Worm d) Virus 9) Data travels across networks in a) Parcels b) Parts c) Bit rates d) Packets 10) What form of attack sends many and repeated requests to a server in order to bring it offline a) SQL b) DDOS c) USB d) WLAN 11) Organisations can protect themselves from SQL injection attacks by a) Using locked server rooms b) Only using wired connections c) Penetration Testing d) Hiring security guards 12) An effect of SQL injection a) Full access to the target computer b) Network access to the computer only c) Ability to edit all files d) Attackers can manipulate data in the database 13) An SQL injection attack would give the attacker unauthorised access to a) Network settings b) Emails c) A database d) Hardware 14) A network of computers infected with malicious software and controlled as part of a group without the owners’ knowledge to commit a DDOS attack is called a: a) Penetration testing b) Packet Tracing c) Defragmentation d) System backup and restoration 15) A type of hacker who does so for good reasons, with permission a) Black hat b) Grey hat c) Red hat d) White hat 16) A method used to prevent physical access to the system a) Encryption b) Biometric door lock c) Firewall d) Anti-Malware 17) What features might give away a phishing email? a) Poor spelling b) A hyperlink to a login page c) Generic welcome message, not personalised d) All of the above 18) A user gaining access to a system or intercepting user data without permission would be breaching which law? a) Data Protection Act b) Regulation of Investigatory Powers Act (RIPA) c) Investigatory Powers Act d) Computer Misuse Act 19) Software that monitors internal and external network connections on a computer between a potential attacker and the computer system a) Anti-virus b) Firewall c) Windows Update d) Disk Defragmenter 20) These define access permissions for a user a) Email box size b) Network and hardware settings c) User Maintenance d) Group and User Settings 21) Which of these would help to increase security on a computer system? a) Use password complexity rules b) Require two-factor authentication c) Limit of the number of password guesses d) All of the above 22) What is encryption? a) Securely deleting messages so that they cannot be read b) A method of bypassing viruses c) A form of anti-virus d) Where data is translated into code so that only authorised users, or users with the key can decrypt it 23) What must a user need to decrypt a file? a) Coin b) Key c) Token d) Graph 24) A Caeser cipher uses what in order for decryption? a) Token shift b) Graph token c) Shift key number d) Coin number 25) What would most students on a school network usually be able to access? a) Access to all network b) Full access c) Access to personal documents and the internet d) Access to all printers
0%
Network Security
共享
共享
共享
由
Srae4
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
随堂测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?