0

System Security Online Quiz

Description: System Security
Number of Questions: 30
Created by:
Tags: computer science
Attempted 0/30 Correct 0 Score 0

Typically, what level of access would a student have in a school on the network?

  1. All folders on the network

  2. Full Access

  3. Own Document and Internet

  4. All Printers


Correct Option: C

A caeser cipher uses what for decrpytion?

  1. Token Shift

  2. Graph Token

  3. Shift Number

  4. Coin Number


Correct Option: C

What must a user have to decrypt a file

  1. Coin

  2. Key

  3. Token

  4. Graph


Correct Option: B

What is Encryption?

  1. Where only the sender and receiver can read the information

  2. A method of bypassing viruses

  3. A form of anti virus

  4. Where data is scrambled so only those with a key can read it


Correct Option: D

Identify security Requirements with Passwords below...

  1. Use password complexity levels

  2. Require 2 factor authentication

  3. Limit the amount of guesses

  4. All of the above


Correct Option: D

These define access permissions for a user

  1. Group Permissions

  2. User Access Levels

  3. User Maintenance

  4. Group and User Settings


Correct Option: B

Defines how a system can be secured through specific rules or requirements

  1. Security Policy

  2. Data Retention Policy

  3. Password Policy

  4. Sign in Book


Correct Option: A

Software that performs a barrier between a potential attack and the computer system

  1. Anti Virus

  2. Firewall

  3. Windows Update

  4. Disk Defragmenter


Correct Option: B

A user gaining access to a system or intercepting data without permission would break what law?

  1. Data Protection Act

  2. Investigatory Powers Act

  3. Computer Misuse Act

  4. Legal Drinking Age


Correct Option: C

Law Enforcement Agencies can intercept data under what law?

  1. Data Protection Act

  2. Investigatory Powers Act

  3. Computer Misuse Act

  4. Legal Drinking Age


Correct Option: B

An example of a network forensic technique is...

  1. Packet Sniffing

  2. Running Anti Virus

  3. Updating the computer

  4. Syncing with the server


Correct Option: A

Network Forensics primarily involves...

  1. Examination of Computers

  2. Examination of Data being sent over a network

  3. Examination of Phones

  4. Examination of all computer data


Correct Option: B

The official title of the person responsible for exploring and reporting vulnerabilities

  1. Penetration Tester

  2. Systems Administrator

  3. Network Manager

  4. Forensic Technician


Correct Option: A

Network of computers infected with malware and controlled as a group without owner's knowledge

  1. Virus

  2. Stuxnet

  3. Ring

  4. Botnet


Correct Option: D

An SQL injection attack would cause unauthorised access to...

  1. Files

  2. Whole Computer

  3. Databases

  4. Operating System


Correct Option: C

An effect of SQL injection...

  1. Full access to target computer

  2. Network access to computer only

  3. Ability to edit all files

  4. Can access database and manipulate data


Correct Option: D

Organisations can protect themselves from SQL injections by installing...

  1. Patches

  2. Software

  3. Upgrade

  4. Downgrade


Correct Option: A

Uses a number of systems over a network to bring a website offline

  1. SQL

  2. DDOS

  3. USB

  4. WLAN


Correct Option: B

Data Travels across networks in...

  1. Nibbles

  2. Parts

  3. Bytes

  4. Packets


Correct Option: D

Social Engineering, Phishing and Worm are examples of...

  1. Viruses

  2. Scams

  3. Data Interception

  4. Malware


Correct Option: C

Sending requests to a single server using hijacked machines is...

  1. Phishing

  2. DDOS

  3. Worm

  4. Virus


Correct Option: B

How do hackers use viruses?

  1. To make a computer unusable

  2. To get someone's personal info

  3. To get card details

  4. All of the above


Correct Option: D

What can viruses effect?

  1. Keyboard

  2. Hard Drive

  3. RAM

  4. All of the above


Correct Option: D

How many viruses are made each day?

  1. 10

  2. 30

  3. 54,000

  4. 82,000


Correct Option: D

Trojan Horses...

  1. ...do not need to attach to a program

  2. ...need to attach to a program

  3. ...a type of social engineering

  4. ...designed to mislead users and prompt downloading of it


Correct Option: B

Worms...

  1. ...do not need to attach to a program

  2. ...need to attach to a program

  3. ...a type of social engineering

  4. ...designed to mislead users and prompt downloading of it


Correct Option: B

Viruses...

  1. ...do not need to attach to a program

  2. ...need to attach to a program

  3. ...a type of social engineering

  4. ...designed to mislead users and prompt downloading of it


Correct Option: B

Malware...

  1. ...are different threats to computer systems

  2. ...manufacture computer parts

  3. ...is hard to find on the internet

  4. ...is completely legal


Correct Option: A

Example of a Network Policy

  1. Phising

  2. Virus

  3. Data Theft

  4. Acceptable Use Policy


Correct Option: D

An example of Social Engineering...

  1. Viruses

  2. Worms

  3. Telephone Phishing

  4. Trojan Horses


Correct Option: C
- Hide questions