ECDL Unit 1 Quiz 1

36 Questions | Attempts: 9000
Share

SettingsSettingsSettings
ECDL Unit 1 Quiz 1 - Quiz

A quiz to help those preparing for the ECDL Essentials unit 1 test.


Questions and Answers
  • 1. 
    Which one of the following can cause data corruption?
    • A. 

      A. Encrypted USB drives.

    • B. 

      B. Expired passwords.

    • C. 

      C. Software incompatibility.

    • D. 

      D. Application of software patches

  • 2. 
    Which one of the following describes how a portable or removable device can be protected from theft when NOT in use?
    • A. 

      A. By activating a firewall.

    • B. 

      B. By installing anti-virus software.

    • C. 

      C. By locking it in a drawer.

    • D. 

      D. By storing documents in a folder.

  • 3. 
    Which one of the following is MOST likely to happen if a network is unsecured?
    • A. 

      A. Information will be accessible to others.

    • B. 

      B. Information will be only be available during office hours.

    • C. 

      C. Information will be lost.

    • D. 

      D. Information will be corrupted.

  • 4. 
    Which one of the following describes how a password helps to keep a computer secure?
    • A. 

      A. It compresses data contained on a computer.

    • B. 

      B. It duplicates information being stored on a computer.

    • C. 

      C. It protects information on a computer from risk of unauthorised access.

    • D. 

      D. It encrypts information being stored on a computer.

  • 5. 
    Which one of the following describes how a malicious program can enter a computer?
    • A. 

      A. By downloading files from unknown websites.

    • B. 

      B. By deleting e-mails from known senders.

    • C. 

      C. By forwarding email attachments from unknown sources.

    • D. 

      D. By installing new Windows updates.

  • 6. 
    Which one of the following describes how a breach in IT security should be reported?
    • A. 

      A. By telephoning your manager.

    • B. 

      B. By gossiping with co-workers.

    • C. 

      C. Using the channel identified in the organisation’s security policy.

    • D. 

      D. By sending an anonymous fax.

  • 7. 
    Which one of the following describes what you should do if you receive a chain letter email?
    • A. 

      A. Delete it.

    • B. 

      B. Download any of its attachments.

    • C. 

      C. Reply to it.

    • D. 

      D. Forward it.

  • 8. 
    Which one of the following could happen if a computer suddenly malfunctions due to proximity to a heat source?
    • A. 

      A. Any files saved only on the hard disk of the computer will be lost.

    • B. 

      B. The operating system will automatically save all files and shutdown.

    • C. 

      C. External USB device backup will be lost.

    • D. 

      D. The Firewall settings will be turned down.

  • 9. 
    Which one of the following is at risk from unauthorised access to a computer?
    • A. 

      A. Installed software application licences can be stolen.

    • B. 

      B. Confidential information can be accessed.

    • C. 

      C. Shareware services will be stopped.

    • D. 

      D. Your system administrator will lose access to your computer.

  • 10. 
    Which one of the following should you do to ensure that you follow an organisation’s privacy policy when communicating internally?
    • A. 

      A. Communicate only with secretaries.

    • B. 

      B. Consult the Legal Department or policy manual when in doubt.

    • C. 

      C. Copy all departments on all emails.

    • D. 

      D. Communicate only with managers.

  • 11. 
    Which one of the following describes phishing?
    • A. 

      A. Backdoor entry into a computer.

    • B. 

      B. Fraudulent acquisition of personal information.

    • C. 

      C. Chain emails forwarded to you.

    • D. 

      D. Fake virus warnings.

  • 12. 
    Which one of the following describes a firewall?
    • A. 

      A. Internet blogging software.

    • B. 

      B. An Internet connection filter.

    • C. 

      C. A phone socket filter.

    • D. 

      D. Anti-malware software.

  • 13. 
    Which one of the following is MOST likely to happen if you keep your PDA in an open pocket of your bag?
    • A. 

      A. The battery will go dead.

    • B. 

      B. Your bag will corrode.

    • C. 

      C. The PDA will be stolen.

    • D. 

      D. You will receive text messages from strangers.

  • 14. 
    Which one of the following is a security risk associated with using the default password on a network?
    • A. 

      A. Increased spam.

    • B. 

      B. Disabled Firewall.

    • C. 

      C. Slow speed of connection.

    • D. 

      D. Low resistance to hackers.

  • 15. 
    Which one of the following statements about a password is TRUE?
    • A. 

      A. It should be changed regularly.

    • B. 

      B. It cannot contain special character symbols.

    • C. 

      C. It should only contain capital letters.

    • D. 

      D. Only you and your manager should know it.

  • 16. 
    Which one of the following describes why you should follow procedures while using IT resources in an organisation?
    • A. 

      A. To ensure the secure use of IT resources.

    • B. 

      B. To allow sales reps to track selling patterns.

    • C. 

      C. To allow managers to track your work effects.

    • D. 

      D. To ensure easy access to information on your computer.

  • 17. 
    Which one of the following describes why it is important to have a secure off-site backup copy of files?
    • A. 

      A. To reduce downtime caused by file loss in case of a disaster.

    • B. 

      B. To allow you time to disable the office Firewall.

    • C. 

      C. To stop viruses from attacking the network.

    • D. 

      D. To transfer spam on the backup server.

  • 18. 
    Which one of the following is the name for unwanted bulk messages sent by unknown sources?
    • A. 

      A. Malware.

    • B. 

      B. Spyware.

    • C. 

      C. Viruses.

    • D. 

      D. Spam.

  • 19. 
    Which one of the following will protect a computer from malicious programs?
    • A. 

      A. Marking emails with attachments from unknown senders as junk mail.

    • B. 

      B. Allowing everyone access to a computer.

    • C. 

      C. Removing login passwords.

    • D. 

      D. Installing software received in emails from unknown users.

  • 20. 
    Which one of the following describes how confidential information should be sent using an unsecured network?
    • A. 

      A. In a text only file.

    • B. 

      B. In an encrypted format.

    • C. 

      C. In a compressed format.

    • D. 

      D. With your name typed at the end of the email.

  • 21. 
    Which one of the following can protect a computer from the risk of unwanted emails?
    • A. 

      A. Using anti-spam software.

    • B. 

      B. Using anti-Bluetooth software.

    • C. 

      C. Using anti-virus software.

    • D. 

      D. Using anti-trojan software.

  • 22. 
    Which one of the following will ensure that software is stored safely?
    • A. 

      A. Storing it in a place free of magnetic fields.

    • B. 

      B. Backing up the software applications.

    • C. 

      C. Placing it close to the computer.

    • D. 

      D. Downloading illegal updates of the software.

  • 23. 
    Which one of the following describes the IT security checks that should be carried out when using a device that is NOT part of an organisation’s IT infrastructure?
    • A. 

      A. The checks listed in the organisation’s security policy.

    • B. 

      B. The checks listed in an help forum.

    • C. 

      C. The checks listed in the device manual.

    • D. 

      D. The checks sugguested by a colleague.

  • 24. 
    Which one of the following is an example of phishing?
    • A. 

      A. An email containing a trojan via a file attachment.

    • B. 

      B. An email asking you to forward it on to ten people in your address book.

    • C. 

      C. An email directing the recipient to a website to verify credit card details.

    • D. 

      D. An email warning the recipient of a computer virus threat.

  • 25. 
    Which one of the following describes how confidential information should be sent using an unsecured network?
    • A. 

      A. Compressed using a data compression tool.

    • B. 

      B. Digitally signed to confirm its authenticity.

    • C. 

      C. Only send confidential information in the post.

    • D. 

      D. Encrypted, so that only a person with a key can decrypt it.

Related Topics

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.