A quiz to help those preparing for the ECDL Essentials unit 1 test.
A. Encrypted USB drives.
B. Expired passwords.
C. Software incompatibility.
D. Application of software patches
A. By activating a firewall.
B. By installing anti-virus software.
C. By locking it in a drawer.
D. By storing documents in a folder.
A. Information will be accessible to others.
B. Information will be only be available during office hours.
C. Information will be lost.
D. Information will be corrupted.
A. It compresses data contained on a computer.
B. It duplicates information being stored on a computer.
C. It protects information on a computer from risk of unauthorised access.
D. It encrypts information being stored on a computer.
A. By downloading files from unknown websites.
B. By deleting e-mails from known senders.
C. By forwarding email attachments from unknown sources.
D. By installing new Windows updates.
A. By telephoning your manager.
B. By gossiping with co-workers.
C. Using the channel identified in the organisation’s security policy.
D. By sending an anonymous fax.
A. Delete it.
B. Download any of its attachments.
C. Reply to it.
D. Forward it.
A. Any files saved only on the hard disk of the computer will be lost.
B. The operating system will automatically save all files and shutdown.
C. External USB device backup will be lost.
D. The Firewall settings will be turned down.
A. Installed software application licences can be stolen.
B. Confidential information can be accessed.
C. Shareware services will be stopped.
D. Your system administrator will lose access to your computer.
A. Communicate only with secretaries.
B. Consult the Legal Department or policy manual when in doubt.
C. Copy all departments on all emails.
D. Communicate only with managers.
A. Backdoor entry into a computer.
B. Fraudulent acquisition of personal information.
C. Chain emails forwarded to you.
D. Fake virus warnings.
A. Internet blogging software.
B. An Internet connection filter.
C. A phone socket filter.
D. Anti-malware software.
A. The battery will go dead.
B. Your bag will corrode.
C. The PDA will be stolen.
D. You will receive text messages from strangers.
A. Increased spam.
B. Disabled Firewall.
C. Slow speed of connection.
D. Low resistance to hackers.
A. It should be changed regularly.
B. It cannot contain special character symbols.
C. It should only contain capital letters.
D. Only you and your manager should know it.
A. To ensure the secure use of IT resources.
B. To allow sales reps to track selling patterns.
C. To allow managers to track your work effects.
D. To ensure easy access to information on your computer.
A. To reduce downtime caused by file loss in case of a disaster.
B. To allow you time to disable the office Firewall.
C. To stop viruses from attacking the network.
D. To transfer spam on the backup server.
A. Malware.
B. Spyware.
C. Viruses.
D. Spam.
A. Marking emails with attachments from unknown senders as junk mail.
B. Allowing everyone access to a computer.
C. Removing login passwords.
D. Installing software received in emails from unknown users.
A. In a text only file.
B. In an encrypted format.
C. In a compressed format.
D. With your name typed at the end of the email.
A. Using anti-spam software.
B. Using anti-Bluetooth software.
C. Using anti-virus software.
D. Using anti-trojan software.
A. Storing it in a place free of magnetic fields.
B. Backing up the software applications.
C. Placing it close to the computer.
D. Downloading illegal updates of the software.
A. The checks listed in the organisation’s security policy.
B. The checks listed in an help forum.
C. The checks listed in the device manual.
D. The checks sugguested by a colleague.
A. An email containing a trojan via a file attachment.
B. An email asking you to forward it on to ten people in your address book.
C. An email directing the recipient to a website to verify credit card details.
D. An email warning the recipient of a computer virus threat.
A. Compressed using a data compression tool.
B. Digitally signed to confirm its authenticity.
C. Only send confidential information in the post.
D. Encrypted, so that only a person with a key can decrypt it.
Wait!
Here's an interesting quiz for you.