IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

1.2 Comp Programming - Understanding the CIA Triad

1.2 Comp Programming - Understanding the CIA Triad

9th Grade

10 Qs

Year 8 Keep it safe 2

Year 8 Keep it safe 2

6th - 10th Grade

10 Qs

24. ComSys - Systems Software Quiz

24. ComSys - Systems Software Quiz

9th - 12th Grade

11 Qs

Error Detection Methods of Data Tranmission

Error Detection Methods of Data Tranmission

9th - 12th Grade

10 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

C1 Cryptography & Encryption

C1 Cryptography & Encryption

11th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

CC 6:14 - 6:19 Terms

CC 6:14 - 6:19 Terms

9th Grade

11 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Mykhailo Shapkin

Used 29+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is

Malicious code installed to redirect users to a fake website

A way of gaining illegal access to a computer system

Sitting on a cool PC chair in black hoodie at night and staring at green digits on a monitor

Malicious code installed to redirect users to a fake website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus in comp sci context is

A form of encryption requiring both a public and a private key

A thing that makes your computer cough

Program code that can replicate/copy itself with the intention of

deleting/corrupting data/files or causing the computer to malfunction

Malicious code installed to redirect users to a fake website

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

Sending legitimate-looking emails to encourage users to give out personal data

The editing of program source code so that it can be exploited or changed for a specific purpose

Playing fishing games on a PC professionally

Used to verify that data comes from a trusted source

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pharming is

Pieces of data which allow detection of web pages viewed by a user and store their preferences

A way of gaining illegal access to a computer system

Playing farming games on a PC semi-professionally

Malicious code installed to redirect users to a fake website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shareware is

Software that a user can download free of charge and use for free forever, no caveats

Software that user can try out for free for a trial period

Used to verify that data comes from a trusted source

Part of Ukrainian national dress (for real though, sounds very similar)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric encryption is

A form of encryption requiring both a public and a private key

A set of principles set out to regulate use of computers

A way of gaining illegal access to a computer system

A form of encryption using one private key for both sender and recipient

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware / key-logging software is

Software that gathers data by monitoring key presses on user's keyboards

A form of encryption requiring both a public and a private key

Malicious code installed to redirect users to a fake website

Secret type of software that only spies can use

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?