A Level Computer Security Quiz 1

15 QuestionsMultiple ChoiceFree Practice

About this quiz

This A Level Computer Security Quiz 1 quiz contains 15 multiple choice questions designed to help you revise and test your A Level Computer Security Quizzes knowledge. Select an answer for each question and click “Submit Answer” to see instant feedback. Take your time and try to score as high as possible!

Description

In this computer science quiz, we shall be going through some important concepts on computer security such as encryption, Hypertext Transfer Protocol Secure (HTTPS), the various types of malware (Trojan Horse, Virus, Worm, etc), the uses of malware, and so on. You won’t want to miss out on this.

Computer security refers to the protection of computer systems from unauthorized usage, theft, and harm. Similarly, computer hardware is protected in the same way as other sensitive equipment, making use of doors and locks, alarms, or serial numbers. An example of a serious security issue is the theft of data such as of military details or secrets from government computers. Nowadays our mobile phones are being equipped with a lot of security technologies. For example, some phones make use of a fingerprint sensor that requires the owner’s fingerprint before access is given. Below are some tips for password-protected accounts or devices:

- Make use of at least 10 characters

- Avoid using common words, names, or dates. combine letters, symbols, and numbers.

- Avoid using the same password for several accounts.

- Do not share passwords.

- Keep the password away from plain sight.

By now you should have understood the importance of computer security. If you are willing to know more about it, answer the following questions. Good luck as you solve the quiz

Progress0 / 15 answered
1

Question 1 of 15

___________ ensures the integrity and security of data that are passing over a network.

2

Question 2 of 15

Which of the following is not a strong security protocol?

3

Question 3 of 15

__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?

4

Question 4 of 15

HTTPS is abbreviated as _________

5

Question 5 of 15

S/MIME is abbreviated as __________________

6

Question 6 of 15

Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.

7

Question 7 of 15

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____

8

Question 8 of 15

What is Spyware?

9

Question 9 of 15

What are the uses of Malware?

10

Question 10 of 15

In public key cryptosystem _____ keys are used for encryption and decryption.

11

Question 11 of 15

Pretty good privacy program is used for

12

Question 12 of 15

Which are called the block ciphers?

13

Question 13 of 15

The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.

14

Question 14 of 15

An algorithm in encryption is called ______

15

Question 15 of 15

The information that gets transformed in encryption is _________