Jss2 first term security education past questions and answers
Question: What is the purpose of a firewall in computer security?
a) To block unauthorized access
b) To speed up internet connection
c) To create a backup
d) To organize files
Answer: a) To block unauthorized access
Question: Which of the following is an example of a strong password?
a) 123456
b) Password123
c) 8#&sUn!2
d) abcdef
Answer: c) 8#&sUn!2
Question: What does the acronym "SSL" stand for in the context of internet security?
a) Secure Socket Layer
b) Super Speedy Link
c) System Software Language
d) Safe Surfing Level
Answer: a) Secure Socket Layer
Question: How can social engineering attacks be prevented?
a) Installing antivirus software
b) Ignoring all emails from unknown senders
c) Being cautious and verifying requests for sensitive information
d) Clearing browser cookies regularly
Answer: c) Being cautious and verifying requests for sensitive information
Question: What is the purpose of antivirus software?
a) To speed up the computer
b) To create a firewall
c) To detect and remove malicious software
d) To organize files
Answer: c) To detect and remove malicious software
Question: In the context of online security, what is phishing?
a) Catching harmful viruses
b) Fishing for compliments
c) Fraudulent attempts to obtain sensitive information
d) Securing personal emails
Answer: c) Fraudulent attempts to obtain sensitive information
Question: What does the term "two-factor authentication" mean?
a) Using two different internet browsers
b) Verifying identity with two different methods
c) Changing passwords twice a day
d) Using two different computers simultaneously
Answer: b) Verifying identity with two different methods
Question: Why is it important to keep software and operating systems up to date for security?
a) To improve internet speed
b) To access new features
c) To fix security vulnerabilities
d) To organize files
Answer: c) To fix security vulnerabilities
Question: What is the purpose of a VPN (Virtual Private Network) in security?
a) To enhance computer graphics
b) To create a secure, encrypted connection over the internet
c) To organize virtual files
d) To improve Wi-Fi signal strength
Answer: b) To create a secure, encrypted connection over the internet
Question: What should you do if you receive a suspicious email with a link or attachment?
a) Click on the link to investigate
b) Open the attachment immediately
c) Delete the email without opening any links or attachments
d) Forward the email to all contacts
Answer: c) Delete the email without opening any links or attachments
Question: Which of the following is an example of a physical security measure?
a) Password protection
b) Biometric access control
c) Antivirus software
d) Email encryption
Answer: b) Biometric access control
Question: What is the purpose of a backup in terms of data security?
a) To speed up file access
b) To create additional copies of files
c) To block unauthorized access
d) To organize folders
Answer: b) To create additional copies of files
Question: Why is it important to log out of accounts when using shared computers?
a) To save energy
b) To protect personal information
c) To improve computer performance
d) To organize files
Answer: b) To protect personal information
Question: What is the primary goal of encryption in information security?
a) To increase internet speed
b) To create secure passwords
c) To protect data by converting it into a coded form
d) To organize digital documents
Answer: c) To protect data by converting it into a coded form
Question: What does the term "malware" refer to in computer security?
a) Malicious software
b) A type of hardware
c) Software for organizing files
d) Mail-related issues
Answer: a) Malicious software
Question: When using public Wi-Fi, what should you avoid to enhance security?
a) Sharing personal information freely
b) Connecting to a VPN
c) Using strong passwords
d) Regularly updating device software
Answer: a) Sharing personal information freely
Question: What is the purpose of a CAPTCHA in online security?
a) To identify and verify human users
b) To block internet access
c) To create secure passwords
d) To organize digital files
Answer: a) To identify and verify human users
Question: How often should you change your passwords for online accounts?
a) Once a year
b) Every month
c) Only when you forget them
d) Regularly, at least every few months
Answer: d) Regularly, at least every few months
Question: What is the role of an intrusion detection system (IDS) in network security?
a) To organize network cables
b) To detect and respond to unauthorized access or activities
c) To improve internet speed
d) To secure physical access points
Answer: b) To detect and respond to unauthorized access or activities
Question: What is the significance of user awareness training in cybersecurity?
a) To teach coding skills
b) To raise awareness about potential security threats and best practices
c) To organize digital files
d) To speed up internet connection
Answer: b) To raise awareness about potential security threats and best practices
Post a Comment