![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
Preventing security threats
Quiz by GCSE Computer Science Teacher 3
GCSE (AQA)
Computer Science
English National Curriculum
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 1 skill from
Measures 1 skill from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1Why is the prevention of security threats so important?It is easier to prevent a breach than to deal with the effects of a security breachIt isn't, dealing with security breaches as they happen is more efficientIt is inexpensive to deal with preventative securityTo allow hackers access to your network45s3.6.2
- Q2What are Biometrics in relation to device security?Using passwords to access accountsUsing biological samplesRecording birth information of usersMethods of authentication. It relies on unique characteristics of human beings.45s3.6.2
- Q3Which of the following is not an example of Biometric authentication?Face recognitionPassword authenticationRetina ScannerFingerprint scanner45s3.6.2
- Q4Why have Biometric measures of authentication have become common within mobile devices?Because they are cheaperBecause they are less complicated than programming password checkersBecause they are unique to each userTo store all persons Biometric data45s3.6.2
- Q5Which of the following is a common biometric method used to unlock mobile devices?PasswordsPincodesVoice recognitionFingerprint scanner45s3.6.2
- Q6The most common reason why people don't use Biometric security methods is?They find the technology intrusiveThey find it expensiveThey find it unreliableThey find it counter productive45s3.6.2
- Q7The purpose of CAPTCHA is?To allow Computers to enter information on a formTo tell Computers and Humans Apart when entering informationTo divert web trafficTo monitor activity on the website45s3.6.2
- Q8How can you tell for sure if a website is not encrypting your password properly?The URL does not have HTTPS at the startThey send you your password in plain text when you ask for a reminderThe web page is badly designed and looks cheapThey do not have the lock symbol in the web browser45s3.6.2
- Q9What is a firewall?A web filter than blocks over 18 sitesA physical wall between the network and the internetA type of virusSoftware that checks data coming from the Internet or a network45s3.6.2
- Q10Which of the following should not be a part of your password?Your nameNumbersSpecial symbolsRandom characters45s3.6.2
- Q11Which of the following should be in your password?Your nameYour favourite teamsYour date of birthSpecial characters45s3.6.2
- Q12Should you use a different password for every account you have?Maybe - Only if you use different computersNo - it is hard to remember that manyNo - it is less secure if you have more than oneYes - this is the best way to keep secure45s3.6.2
- Q13What does a White Hat Hacker do?Ethically hacks a network to look for weaknessesHacks 'white collar' company networksHacks a network, and then offers to fix the breaches for a feeUnethically hacks a network to look for weaknesses45s3.6.2
- Q14What does a Grey Hat Hacker do?Unethically hacks a network to look for weaknessesEthically hacks a network to look for weaknessesHacks companies just for fun, not to cause any damageHacks a network, and then offers to fix the breaches for a fee45s3.6.2