No student devices needed. Know more
10 questions
This type of attack is designed to hinder the normal operation of a website, or other network resource.
DoS attack
Phishing
Browser hijacker
Zero-Day Attack
Which one of the following describes spam?
Collect information about a person or organisation without their knowledge
Performing an unauthorised, usually malicious, action such as erasing files
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages.
Which one of the following can protect a computer from the risk of unwanted emails?
Anti-spam software.
Anti-virus software.
Anti-spyware software.
PC diagnostic software.
Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
Which one of the following shows respect for the confidentiality of information?
Discussing confidential information over the telephone.
Disclosing confidential information only to authorised individuals.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the receiver to enter personal details on a fake website
An email directing the recipient to download an attachment
Which of the following four passwords is the most secure?
rock123
2minus1=monster
WTh!57
0365443367
You are using a public internet trying to send emails to your colleagues. To protect your communications you should
Find the strongest WiFi signal near you
Turn off your file sharing
Use a Virtual Private Network (VPN)
How often should you backup your data?
Once a week
Once a month
In accordance witth your organization's backup policy
Once a fortnight