Jss1 first term education security past questions and answers
Question: What is the primary purpose of a firewall in computer security?
a) To prevent physical theft
b) To filter network traffic and prevent unauthorized access
c) To secure confidential documents on a computer
d) To protect against malware attacks
Answer: b) To filter network traffic and prevent unauthorized access
Question: What does the term "phishing" refer to in the context of cybersecurity?
a) A method of catching computer viruses
b) Sending malicious software through email
c) Attempting to trick individuals into revealing sensitive information
d) Encrypting files for ransom
Answer: c) Attempting to trick individuals into revealing sensitive information
Question: Which of the following is a strong password practice?
a) Using your name and birthdate
b) Creating a password with a combination of letters, numbers, and symbols
c) Using the same password for multiple accounts
d) Changing your password once a year
Answer: b) Creating a password with a combination of letters, numbers, and symbols
Question: What is malware?
a) A type of hardware used in computers
b) Malicious software designed to harm or exploit devices or networks
c) A computer accessory for better performance
d) A type of computer programming language
Answer: b) Malicious software designed to harm or exploit devices or networks
Question: What is the purpose of antivirus software?
a) To speed up computer performance
b) To protect against malicious software
c) To organize files on a computer
d) To enhance internet connectivity
Answer: b) To protect against malicious software
Question: What does the term "two-factor authentication" mean?
a) Using two different computers for authentication
b) Verifying identity through two separate methods or factors
c) Logging in with a username and password only once
d) Accessing the internet from two different locations
Answer: b) Verifying identity through two separate methods or factors
Question: What is the purpose of regular software updates in terms of security?
a) To introduce new features
b) To remove all existing software
c) To fix security vulnerabilities and bugs
d) To increase the cost of the software
Answer: c) To fix security vulnerabilities and bugs
Question: Why is it important to log out of your accounts when using public computers?
a) To save energy
b) To protect your personal information from unauthorized access
c) To speed up the computer
d) To avoid software conflicts
Answer: b) To protect your personal information from unauthorized access
Question: What is a data breach?
a) Accidentally deleting files
b) Unintentionally sharing sensitive information
c) Unauthorized access to and retrieval of sensitive data
d) Upgrading software
Answer: c) Unauthorized access to and retrieval of sensitive data
Question: What is the purpose of a virtual private network (VPN)?
a) To create virtual reality environments
b) To secure internet connections and protect data transmission
c) To enhance computer graphics
d) To store data in a virtual space
kotlin
Copy code
**Answer:** b) To secure internet connections and protect data transmission
11. Question: How can you identify a secure website?
a) It has a catchy domain name
b) It uses "https://" in the URL and displays a padlock icon
c) It has a lot of advertisements
d) It requires personal information for access
Answer: b) It uses "https://" in the URL and displays a padlock icon
Question: What is the purpose of a strong, unique username?
a) To make it easier to remember
b) To hide your identity online
c) To prevent unauthorized access to your accounts
d) To share access with others
Answer: c) To prevent unauthorized access to your accounts
Question: What is a cookie in the context of internet security?
a) A delicious snack for computers
b) A small piece of data stored on a user's device by a website
c) A type of virus
d) A physical device used for authentication
Answer: b) A small piece of data stored on a user's device by a website
Question: What is social engineering in the context of cybersecurity?
a) Upgrading social media accounts
b) Manipulating individuals to divulge confidential information
c) Building a social network for online games
d) Enhancing communication skills on the internet
Answer: b) Manipulating individuals to divulge confidential information
Question: What is the purpose of a backup in data security?
a) To increase computer speed
b) To restore deleted files
c) To duplicate important data to prevent data loss
d) To uninstall unnecessary software
Answer: c) To duplicate important data to prevent data loss
Question: What is a firewall?
a) A physical barrier for computer protection
b) A program that protects against computer viruses
c) A device for cooling computers
d) A tool for organizing files on a computer
Answer: b) A program that protects against computer viruses
Question: What is the purpose of encryption in data security?
a) To make files visible to anyone
b) To hide files from the user
c) To secure data by converting it into a coded format
d) To compress files for efficient storage
Answer: c) To secure data by converting it into a coded format
Question: What is a cybersecurity policy?
a) A set of rules and guidelines for using social media
b) A plan for physical security only
c) A set of rules and practices to protect computer systems and data
d) A strategy for increasing internet speed
Answer: c) A set of rules and practices to protect computer systems and data
Question: What is the purpose of a biometric authentication system?
a) To remember passwords for users
b) To identify individuals based on unique physical or behavioral traits
c) To create virtual reality environments
d) To encrypt files on a computer
Answer: b) To identify individuals based on unique physical or behavioral traits
Question: Why is it important to be cautious about the information you share online?
a) To increase your online popularity
b) To prevent others from knowing about your interests
c) To protect your privacy and avoid potential risks
d) To receive more targeted advertisements
Answer: c) To protect your privacy and avoid potential risks
Post a Comment