There are no comments, be the first and leave one below:
The purpose of a firewall is to:
Protecting the computer from scary monsters.
Blocking programs from the Internet
Controlling which programs can send or receive data packets.
Stop your computer from getting viruses.
Scanning your computer periodically using anti malware means to
Logging into your computer and clicking the "scan" button each time.
Scan the computer system for malware at set times (For example, once a week).
Scanning attachments from emails and downloads from websites.
Making sure that you keep the malware software up to date.
"Enigma" and "Caesar" are both examples of
Keys
Ciphers
What is needed for a computer to decrypt a message?
Key
Cipher
Email
Passcode
How many characters should a password be?
10
8
5
9
6
7
Which of the following is the most secure password?
Cabbages
MrEschHatesC@bBage5
greencabbages
mreschhatesgreencabbages
Worms, Viruses, Zombies and Trojan Horses are all examples of:
Computer viruses
Harmful data
Untrusted programs.
Malicious software (Malware)
When anti malware software finds malware on your computer system,which statement best describes what happens next?
You will be told that you have malware and then have the option of deleting it.
The infected file will be sent to quarantine, so that it is isolated away from the rest of your files. You can then decide whether to delete or repair the file.
The anti malware software will delete the infected file instantly, along with any other files which are linked to it. This keeps the computer system safe and secure.
Which Malware disguises itself as a useful program (e.g. a virus cleaner); however it actually sends viruses to your computer system?
Worm
Trojan Horse
Virus
Zombie
Which malware replicates itself and spreads to other computers on a network?
Which malware attaches itself to a computer program and then replicates?
Which malware performs malicious tasks remotely from your computer system. Examples of this include email spam and Denial of service attacks (DOS).
Phishing emails attempt to:
Obtain sensitive information such as usernames, passwords and bank details
Send malicious software to your computer system in order to slow it down.
Fill your email inbox with spam.
Sell you multi-buy deals on a wide range of fish products, including salmon and tuna.
Which of the following would not help you know whether a website is safe to enter data such as bank details, usernames and passwords?
Not following "click bait" in emails which ask you for details (clicking on a link in an email).
Reading a review website.
Checking the URL spelling to make sure that it looks genuine.
Checking for https:// and the padlock.
Data sent and received over networks are called
Crisp packets
Viruses
Data packets
Data
A business needs to use network security to:
Make sure that customers can trust the business.
Maintain a good reputation so that they do not lose profits.
Keep customer and employee data safe.
All 3 points in this question.
Which security method prevents unauthorised access to your computer profile?
Encryption
Firewall
Passwords
Anti malware
Which security method protects your computer from intruders?
Which security method protects your computer system from malware?
Which of the following is the most important to keep up to date?
Which of the following security methods protects your data packets from being read by unauthorised users?