In modern times, the use of computers and the internet in particular has never been more important. As such, it’s even more important that you know how to safely conduct yourself online. Take the quiz to find out how.
Viruses
Trojans
Hoaxes
Spam
Using anti-virus software
Using anti-spam software
Never using free email sites.
Using a firewall
By installing licensed software
By forwarding email attachments from an unknown source
By opening email attachments from an unknown source
By not downloading files from obscure websites.
Forward the email to others
Download it onto your system
Open it immediately
Delete the email
An email directing the recipient to enter personal details on a fake website
An email warning the recipient of a computer virus threat
An email advertyising a department store
An unwanted email that installs a virus on the recipeint's computer
Install windows software updates
Update the anti-virus software regularly
Restrict computer access to known persons
Install the latest versions of software
PC diadnostic software
Anti-spyware software
Key management software
Anti-spam software
PC diagnostic software.
Anti-spyware software.
Key management software
Anti-spam software
Firewall software
Anti-spam software
Anti-virus software
Anti Malware software
A skilled programmer who writes computer games.
A skilled programmer who creates software and trains youngsters on how to write software.
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
Easy visibility to other users.
Fast access.
High resistance to application of updates.
Low resistance to potential hackers.
Task manager.
Control Panel.
MS Word Options.
Windows Firewall.
Commit it to memory
Keep a note of it in your wallet.
Tell your manager.
Use the name of your Cat.
It authenticates the user and gives access to all information.
It limits access to relevant levels of information.
It enables an accurate audit trail of transactions to be kept.
It gives the user anonymity.
To reduce the use of electricity.
To prevent data from getting corrupted.
To prevent unauthorised access to data
To cool off the hardware
Discussing confidential information over a telephone line.
Uploading confidential information to a shared web site.
Disclosing confidential information only to authorised systems or individuals
Posting confidential data on your company notice board
Theft of identity.
Data corruption.
Loss of job.
Intimidation
It encrypts information being stored on a computer
It protects information from risk of unauthorised access.
It decrypts information being stored on a computer
It removes the need for a password.
Public service.
No data security
. Access to all confidential information
Resource sharing
They cannot be intercepted by unknown users.
They can be visible and accessible to other users.
They work over long distances.
They limit accessibility to other users.
In a compressed only format.
In an encrypted format.
In an unsigned email.
As quickly as possible.
. Long-range wireless protocol for exchanging data
Short-range wireless protocol for exchanging data
Long-range wired protocol for exchanging data
Short-range wired protocol for exchanging data
The IT Department.
The Company Director’s office.
The Purchasing Department
The Sales Department.
By reading the latest issue of the Financial Times
By speaking to the Finance Department.
By reading the policy in the organisation’s policy manual
By speaking to the Sales Department
The checks listed in the device manual
Interview the requesting person
The checks advised by a fellow worker
The checks listed in the organisation’s security policy
Wait!
Here's an interesting quiz for you.