Welcome To Www.ExamWeapon.Com


Click On Our Answer Page Below And Enter The Pin: "PIN 5555"



home
Home
home
JAMB
home
WAEC
home
NECO
home
NABTEB


Jss1 second Term security education past questions and answers

Jss1 second Term security education past questions and answers

Question: What is a virus in the context of computer security?
a) A type of malware that spreads through infected files
b) A hardware component inside a computer
c) A tool for speeding up internet connections
d) A computer programming language

Answer: a) A type of malware that spreads through infected files

Question: Why is it important to lock your computer when you step away from it?
a) To save energy
b) To prevent unauthorized access to your files and data
c) To increase computer speed
d) To update software automatically

Answer: b) To prevent unauthorized access to your files and data

Question: What is the role of a security patch in computer systems?
a) To fix security vulnerabilities and bugs in software
b) To create a backup of files
c) To upgrade hardware components
d) To enhance graphics on a computer

Answer: a) To fix security vulnerabilities and bugs in software

Question: How can you recognize a potentially suspicious email?
a) It includes a lot of emojis
b) It is from a known and trusted source
c) It requests personal information or financial details
d) It contains only images and no text

Answer: c) It requests personal information or financial details

Question: What is the purpose of a security audit?
a) To increase computer performance
b) To evaluate and improve the security of a system
c) To organize files on a computer
d) To remove unnecessary software

Answer: b) To evaluate and improve the security of a system

Question: Why is it important to keep your operating system up to date?
a) To change the computer interface
b) To increase internet speed
c) To fix security vulnerabilities and improve system performance
d) To uninstall unnecessary programs

Answer: c) To fix security vulnerabilities and improve system performance

Question: What is the purpose of a privacy screen on a computer or mobile device?
a) To protect against physical damage
b) To prevent others from seeing your screen in crowded places
c) To improve graphics on the device
d) To enhance internet connectivity

Answer: b) To prevent others from seeing your screen in crowded places

Question: How does a brute-force attack work in the context of cybersecurity?
a) It uses physical force to break into computer systems
b) It attempts to guess passwords through trial and error
c) It relies on social engineering techniques
d) It encrypts files and demands a ransom

Answer: b) It attempts to guess passwords through trial and error

Question: What is the purpose of a secure socket layer (SSL) certificate?
a) To increase computer storage
b) To encrypt data transmitted between a user's browser and a website
c) To improve the speed of internet connections
d) To filter network traffic

Answer: b) To encrypt data transmitted between a user's browser and a website

Question: How can you securely dispose of sensitive documents or hardware?
a) Deleting files and emptying the recycle bin
b) Throwing them in the regular trash
c) Shredding paper documents and using secure methods for hardware disposal
d) Storing them in a separate folder on your computer

Answer: c) Shredding paper documents and using secure methods for hardware disposal

Question: What is the purpose of a CAPTCHA on websites?
a) To test computer hardware
b) To enhance website design
c) To prevent automated bots from accessing or submitting forms
d) To speed up internet connections

Answer: c) To prevent automated bots from accessing or submitting forms

Question: How can you recognize a secure website connection?
a) It has a flashy design
b) It requires a long registration process
c) It uses "https://" in the URL and displays a padlock icon
d) It contains a lot of advertisements

Answer: c) It uses "https://" in the URL and displays a padlock icon

Question: What is the purpose of a password manager?
a) To generate random passwords for each account
b) To remember passwords for users
c) To speed up internet connections
d) To hide files on a computer

Answer: a) To generate random passwords for each account

Question: Why is it important to have a disaster recovery plan for data?
a) To create virtual reality environments
b) To restore data in case of unexpected events or disasters
c) To organize files on a computer
d) To uninstall unnecessary software

Answer: b) To restore data in case of unexpected events or disasters

Question: What is the purpose of user awareness training in cybersecurity?
a) To increase computer speed
b) To educate users about security threats and safe online practices
c) To create virtual reality environments
d) To encrypt files on a computer

Answer: b) To educate users about security threats and safe online practices

Question: How can you avoid falling victim to a social engineering attack?
a) Sharing personal information online
b) Verifying the identity of the person or entity requesting information
c) Using the same password for multiple accounts
d) Clicking on links in unsolicited emails

Answer: b) Verifying the identity of the person or entity requesting information

Question: What is the purpose of a network firewall?
a) To protect against physical damage
b) To filter and monitor incoming and outgoing network traffic
c) To increase computer storage
d) To improve internet connectivity

Answer: b) To filter and monitor incoming and outgoing network traffic

Question: Why is it important to log and monitor system activities?
a) To increase computer performance
b) To analyze user behavior for marketing purposes
c) To detect and respond to security incidents or anomalies
d) To organize files on a computer

Answer: c) To detect and respond to

0 Comments

Post a Comment

Post a Comment (0)

Previous Post Next Post