AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber Security Unit 3 Exam

Cyber Security Unit 3 Exam

9th Grade

20 Qs

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

9th - 12th Grade

15 Qs

Building a Website - Basics

Building a Website - Basics

10th Grade - University

17 Qs

Year 7 Baseline Assessment

Year 7 Baseline Assessment

6th - 8th Grade

25 Qs

Kelas Maya

Kelas Maya

10th Grade

20 Qs

Operating Systems

Operating Systems

5th Grade - University

20 Qs

ICT

ICT

6th - 10th Grade

15 Qs

Y9 - Computer Science

Y9 - Computer Science

8th Grade

20 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

Assessment

Quiz

Computers

8th - 10th Grade

Medium

Created by

Mr Ling-Winston

Used 62+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for social engineering ?
Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems.
The act of building social relationships
The act of engineering society to greater heights
The strengthening of societies to prevent malicious activities online
Pluto

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for malicious code?
A program from an external source which is used for malicious activities
Hostile code
Code created to steal information
Code from an external source

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for weak passwords?
A password which can be easily compromised by brute forcing possible augmentations of charachters
A password that can be easily guessed
A password consisting of a single type of charachter, often forming a word.
A password that has become compromised

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for strong passwords?
A password that would take a long time (on average) to compromise through attempting different augmentations of charachters
A password that is hard to guess
A password consisting of multiple charachter types that do not form a single word.
A password that only the user knows

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for misconfigured access rights?
A case in which a person does not have / has access to data they should / should not have
A case in which someone gains access to some data
A case in which someone has compromised a system to retrieve data.
The case when someone made a mistake setting up an account

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for removable media?
A store of data that can be removed from the computer such as USBs
A removable add on to a computer
Software that can be deleted
A storage device such as a USB stick or disc drive

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the best definition for unpatched software?
Software which has bugs that require fixing
Software that has bugs
Software that requires an update
Software that has later versions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?