
Contact center services grade 8 4th Quarter - Computer Security Measures
Quiz by Cecilia Dumas
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
33 questions
Show answers
- Q1What is a common means of hard disk corruption and hardware damage?Fraud or embezzlementIndustrial espionagePower surges and/or outagesTerrorism30s
- Q2What is the purpose of effective computer security?To publicly share confidential dataTo safeguard computing resources, ensure data integrity, limit access to authorized users, and maintain data confidentialityTo promote cybersecurity risksTo make computing resources accessible to anyone30s
- Q3What is a common threat to the security and integrity of computing resources?Expanding user accessHardware upgradesSuccessful backupsMalware30s
- Q4What is the importance of user authentication in effective computer security?To prevent users from accessing any dataTo make it easier for all users to access all dataTo encrypt all data for added securityTo ensure only authorized users have access to sensitive data30s
- Q5What is the purpose of developing a resilient back-up strategy?To give hackers easy access to sensitive dataTo maximize the risk and implications of error, failure or lossTo minimize the risk and implications of error, failure or lossTo limit user access to authorized personnel only30s
- Q6What is the purpose of encryption of sensitive files in computer security?To maintain data confidentialityTo completely remove sensitive files from the systemTo deter hackers from attempting to access sensitive dataTo make sensitive files easier to access30s
- Q7What is a type of virus that can threaten computer security?SecurewareFirewallMalwareAdware30s
- Q8What is a common guideline for creating a secure password?It should be a simple four-digit code for easy memorization.It should be shared with friends and family members for emergency purposes.It should be at least six and preferably eight or more characters in length, a mixed case of alphanumeric, changed regularly, known only to the user, not obviously related to the user, different for each application used, not based on publicly listed data, and not written down.It should be the user's favorite place listed publicly on social media.It should be the user's birthdate for easy recall.30s
- Q9What are the two types of threats to computer security?Biological and chemicalPhysical and dataSolar and lunarVerbal and nonverbal30s
- Q10What is the main purpose of a firewall?To speed up the network connectionTo prevent unauthorized access to a networkTo allow unlimited access to a networkTo monitor network activity30s
- Q11What is a common example of a phishing attack?A virus that spreads through email attachmentsA physical break-in to steal computer equipmentAn email that appears to be from a legitimate company, asking for personal informationA hacker gaining access to a network through a weak password30s
- Q12What is the term for a software program that appears to be legitimate but actually performs malicious actions?A firewallA Trojan horseA virusA worm30s
- Q13What is the term for a type of attack where the attacker sends a flood of traffic to overwhelm and disable a network or server?A man-in-the-middle attackA phishing attackAn SQL injection attackA DDoS attack30s
- Q14What is the term for a technique used by attackers to trick victims into clicking a malicious link or opening a malicious attachment?Social engineeringPacket sniffingBrute forceARP poisoning30s
- Q15What is the term for the practice of encoding information to make it unreadable without the correct key or password?DecryptionPhishingEncryptionHacking30s