In modern times, the use of computers and the internet in particular has never been more important. As such, it’s even more important that you know how to safely conduct yourself online. Take the quiz to find out how.
Using anti-virus software
Using anti-spam software
Never using free email sites.
Using a firewall
Rate this question:
By installing licensed software
By forwarding email attachments from an unknown source
By opening email attachments from an unknown source
By not downloading files from obscure websites.
Rate this question:
Forward the email to others
Download it onto your system
Open it immediately
Delete the email
Rate this question:
An email directing the recipient to enter personal details on a fake website
An email warning the recipient of a computer virus threat
An email advertyising a department store
An unwanted email that installs a virus on the recipeint's computer
Rate this question:
Install windows software updates
Update the anti-virus software regularly
Restrict computer access to known persons
Install the latest versions of software
Rate this question:
PC diadnostic software
Anti-spyware software
Key management software
Anti-spam software
Rate this question:
PC diagnostic software.
Anti-spyware software.
Key management software
Anti-spam software
Rate this question:
Firewall software
Anti-spam software
Anti-virus software
Anti Malware software
Rate this question:
A skilled programmer who writes computer games.
A skilled programmer who creates software and trains youngsters on how to write software.
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
Rate this question:
Easy visibility to other users.
Fast access.
High resistance to application of updates.
Low resistance to potential hackers.
Rate this question:
Task manager.
Control Panel.
MS Word Options.
Windows Firewall.
Rate this question:
Commit it to memory
Keep a note of it in your wallet.
Tell your manager.
Use the name of your Cat.
Rate this question:
It authenticates the user and gives access to all information.
It limits access to relevant levels of information.
It enables an accurate audit trail of transactions to be kept.
It gives the user anonymity.
Rate this question:
To reduce the use of electricity.
To prevent data from getting corrupted.
To prevent unauthorised access to data
To cool off the hardware
Rate this question:
Discussing confidential information over a telephone line.
Uploading confidential information to a shared web site.
Disclosing confidential information only to authorised systems or individuals
Posting confidential data on your company notice board
Rate this question:
Theft of identity.
Data corruption.
Loss of job.
Intimidation
Rate this question:
It encrypts information being stored on a computer
It protects information from risk of unauthorised access.
It decrypts information being stored on a computer
It removes the need for a password.
Rate this question:
Public service.
No data security
. Access to all confidential information
Resource sharing
Rate this question:
They cannot be intercepted by unknown users.
They can be visible and accessible to other users.
They work over long distances.
They limit accessibility to other users.
Rate this question:
In a compressed only format.
In an encrypted format.
In an unsigned email.
As quickly as possible.
Rate this question:
. Long-range wireless protocol for exchanging data
Short-range wireless protocol for exchanging data
Long-range wired protocol for exchanging data
Short-range wired protocol for exchanging data
Rate this question:
The IT Department.
The Company Director’s office.
The Purchasing Department
The Sales Department.
Rate this question:
By reading the latest issue of the Financial Times
By speaking to the Finance Department.
By reading the policy in the organisation’s policy manual
By speaking to the Sales Department
Rate this question:
The checks listed in the device manual
Interview the requesting person
The checks advised by a fellow worker
The checks listed in the organisation’s security policy
Rate this question:
A technically well-informed team member
A senior member of the cleaning Department
The Systems Administrator
. The Maintenance Department
Rate this question:
By letter to your manager
Using the telephone
Using the channel identified in the organisation’s security policy
By emailing the IT Manager.
Rate this question:
The computer may crash
The selected files will be moved to the Recycle Bin
An important file may accidentally be deleted
A delete file confirmation window may appear
Rate this question:
The operating system will automatically save all files and shutdown.
All open files will be recovered
All off-site backups will be lost.
Any files saved only on the hard disk of the computer may be lost.
Rate this question:
To ensure that in the event of fire, flood or theft backup files are not destroyed
To make the files easily accessible to other locations of the organisation
To enable speedy recovery
To reduce the chance of data corruption due to a virus attack
Rate this question:
Keep it in your pocket
Using misleading file names
Saving files in your Documents folder
Making multiple copies of the data.
Rate this question:
A storage device, clearly labelled
A printout
A website offering a file sharing service
A shared area on a server
Rate this question:
Leave it with a security guard
Leave it with your supervisor
. Close the lid
Use a security cable to secure it to the desk
Rate this question:
Out of sight, on your person
Leave it on the bar
In your jacket pocket hanging over a chair
In your open bag on the floor
Rate this question:
When the data stored on the storage device is encrypted
When the storage device is lost or stolen during transit
When the data files on the storage device are scanned for viruses.
When the storage device is accessed by a wireless device
Rate this question:
By using a firewall
By using a device lock
By using anti virus software
By locking it in a drawer
Rate this question:
Quiz Review Timeline (Updated): Mar 5, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.