Jss1 second Term security education past questions and answers
Question: What is a virus in the context of computer security?
a) A type of malware that spreads through infected files
b) A hardware component inside a computer
c) A tool for speeding up internet connections
d) A computer programming language
Answer: a) A type of malware that spreads through infected files
Question: Why is it important to lock your computer when you step away from it?
a) To save energy
b) To prevent unauthorized access to your files and data
c) To increase computer speed
d) To update software automatically
Answer: b) To prevent unauthorized access to your files and data
Question: What is the role of a security patch in computer systems?
a) To fix security vulnerabilities and bugs in software
b) To create a backup of files
c) To upgrade hardware components
d) To enhance graphics on a computer
Answer: a) To fix security vulnerabilities and bugs in software
Question: How can you recognize a potentially suspicious email?
a) It includes a lot of emojis
b) It is from a known and trusted source
c) It requests personal information or financial details
d) It contains only images and no text
Answer: c) It requests personal information or financial details
Question: What is the purpose of a security audit?
a) To increase computer performance
b) To evaluate and improve the security of a system
c) To organize files on a computer
d) To remove unnecessary software
Answer: b) To evaluate and improve the security of a system
Question: Why is it important to keep your operating system up to date?
a) To change the computer interface
b) To increase internet speed
c) To fix security vulnerabilities and improve system performance
d) To uninstall unnecessary programs
Answer: c) To fix security vulnerabilities and improve system performance
Question: What is the purpose of a privacy screen on a computer or mobile device?
a) To protect against physical damage
b) To prevent others from seeing your screen in crowded places
c) To improve graphics on the device
d) To enhance internet connectivity
Answer: b) To prevent others from seeing your screen in crowded places
Question: How does a brute-force attack work in the context of cybersecurity?
a) It uses physical force to break into computer systems
b) It attempts to guess passwords through trial and error
c) It relies on social engineering techniques
d) It encrypts files and demands a ransom
Answer: b) It attempts to guess passwords through trial and error
Question: What is the purpose of a secure socket layer (SSL) certificate?
a) To increase computer storage
b) To encrypt data transmitted between a user's browser and a website
c) To improve the speed of internet connections
d) To filter network traffic
Answer: b) To encrypt data transmitted between a user's browser and a website
Question: How can you securely dispose of sensitive documents or hardware?
a) Deleting files and emptying the recycle bin
b) Throwing them in the regular trash
c) Shredding paper documents and using secure methods for hardware disposal
d) Storing them in a separate folder on your computer
Answer: c) Shredding paper documents and using secure methods for hardware disposal
Question: What is the purpose of a CAPTCHA on websites?
a) To test computer hardware
b) To enhance website design
c) To prevent automated bots from accessing or submitting forms
d) To speed up internet connections
Answer: c) To prevent automated bots from accessing or submitting forms
Question: How can you recognize a secure website connection?
a) It has a flashy design
b) It requires a long registration process
c) It uses "https://" in the URL and displays a padlock icon
d) It contains a lot of advertisements
Answer: c) It uses "https://" in the URL and displays a padlock icon
Question: What is the purpose of a password manager?
a) To generate random passwords for each account
b) To remember passwords for users
c) To speed up internet connections
d) To hide files on a computer
Answer: a) To generate random passwords for each account
Question: Why is it important to have a disaster recovery plan for data?
a) To create virtual reality environments
b) To restore data in case of unexpected events or disasters
c) To organize files on a computer
d) To uninstall unnecessary software
Answer: b) To restore data in case of unexpected events or disasters
Question: What is the purpose of user awareness training in cybersecurity?
a) To increase computer speed
b) To educate users about security threats and safe online practices
c) To create virtual reality environments
d) To encrypt files on a computer
Answer: b) To educate users about security threats and safe online practices
Question: How can you avoid falling victim to a social engineering attack?
a) Sharing personal information online
b) Verifying the identity of the person or entity requesting information
c) Using the same password for multiple accounts
d) Clicking on links in unsolicited emails
Answer: b) Verifying the identity of the person or entity requesting information
Question: What is the purpose of a network firewall?
a) To protect against physical damage
b) To filter and monitor incoming and outgoing network traffic
c) To increase computer storage
d) To improve internet connectivity
Answer: b) To filter and monitor incoming and outgoing network traffic
Question: Why is it important to log and monitor system activities?
a) To increase computer performance
b) To analyze user behavior for marketing purposes
c) To detect and respond to security incidents or anomalies
d) To organize files on a computer
Answer: c) To detect and respond to
Post a Comment