AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Year 9 Cybersecurity assessment

Year 9 Cybersecurity assessment

10th Grade

25 Qs

Safe or Unsafe?

Safe or Unsafe?

5th - 9th Grade

16 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

CompTIA IT Fundamentals Review (2nd Attempt)

CompTIA IT Fundamentals Review (2nd Attempt)

7th - 8th Grade

20 Qs

Hackers and Malware

Hackers and Malware

8th Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

9th Grade

24 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

Data Security & Data Integrity

Data Security & Data Integrity

10th - 11th Grade

21 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

Assessment

Quiz

Computers

8th - 10th Grade

Medium

Created by

Mr Ling-Winston

Used 62+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for social engineering ?
Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems.
The act of building social relationships
The act of engineering society to greater heights
The strengthening of societies to prevent malicious activities online
Pluto

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for malicious code?
A program from an external source which is used for malicious activities
Hostile code
Code created to steal information
Code from an external source

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for weak passwords?
A password which can be easily compromised by brute forcing possible augmentations of charachters
A password that can be easily guessed
A password consisting of a single type of charachter, often forming a word.
A password that has become compromised

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for strong passwords?
A password that would take a long time (on average) to compromise through attempting different augmentations of charachters
A password that is hard to guess
A password consisting of multiple charachter types that do not form a single word.
A password that only the user knows

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for misconfigured access rights?
A case in which a person does not have / has access to data they should / should not have
A case in which someone gains access to some data
A case in which someone has compromised a system to retrieve data.
The case when someone made a mistake setting up an account

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for removable media?
A store of data that can be removed from the computer such as USBs
A removable add on to a computer
Software that can be deleted
A storage device such as a USB stick or disc drive

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for unpatched software?
Software which has bugs that require fixing
Software that has bugs
Software that requires an update
Software that has later versions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?