placeholder image to represent content

Preventing security threats

Quiz by GCSE Computer Science Teacher 3

GCSE (AQA)
Computer Science
English National Curriculum

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measures 1 skill from
GCSE (AQA)
Computer Science
English National Curriculum

3.6.2

Track each student's skills and progress in your Mastery dashboards

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    Why is the prevention of security threats so important?
    It is easier to prevent a breach than to deal with the effects of a security breach
    It isn't, dealing with security breaches as they happen is more efficient
    It is inexpensive to deal with preventative security
    To allow hackers access to your network
    45s
    3.6.2
  • Q2
    What are Biometrics in relation to device security?
    Using passwords to access accounts
    Using biological samples
    Recording birth information of users
    Methods of authentication. It relies on unique characteristics of human beings.
    45s
    3.6.2
  • Q3
    Which of the following is not an example of Biometric authentication?
    Face recognition
    Password authentication
    Retina Scanner
    Fingerprint scanner
    45s
    3.6.2
  • Q4
    Why have Biometric measures of authentication have become common within mobile devices?
    Because they are cheaper
    Because they are less complicated than programming password checkers
    Because they are unique to each user
    To store all persons Biometric data
    45s
    3.6.2
  • Q5
    Which of the following is a common biometric method used to unlock mobile devices?
    Passwords
    Pincodes
    Voice recognition
    Fingerprint scanner
    45s
    3.6.2
  • Q6
    The most common reason why people don't use Biometric security methods is?
    They find the technology intrusive
    They find it expensive
    They find it unreliable
    They find it counter productive
    45s
    3.6.2
  • Q7
    The purpose of CAPTCHA is?
    To allow Computers to enter information on a form
    To tell Computers and Humans Apart when entering information
    To divert web traffic
    To monitor activity on the website
    45s
    3.6.2
  • Q8
    How can you tell for sure if a website is not encrypting your password properly?
    The URL does not have HTTPS at the start
    They send you your password in plain text when you ask for a reminder
    The web page is badly designed and looks cheap
    They do not have the lock symbol in the web browser
    45s
    3.6.2
  • Q9
    What is a firewall?
    A web filter than blocks over 18 sites
    A physical wall between the network and the internet
    A type of virus
    Software that checks data coming from the Internet or a network
    45s
    3.6.2
  • Q10
    Which of the following should not be a part of your password?
    Your name
    Numbers
    Special symbols
    Random characters
    45s
    3.6.2
  • Q11
    Which of the following should be in your password?
    Your name
    Your favourite teams
    Your date of birth
    Special characters
    45s
    3.6.2
  • Q12
    Should you use a different password for every account you have?
    Maybe - Only if you use different computers
    No - it is hard to remember that many
    No - it is less secure if you have more than one
    Yes - this is the best way to keep secure
    45s
    3.6.2
  • Q13
    What does a White Hat Hacker do?
    Ethically hacks a network to look for weaknesses
    Hacks 'white collar' company networks
    Hacks a network, and then offers to fix the breaches for a fee
    Unethically hacks a network to look for weaknesses
    45s
    3.6.2
  • Q14
    What does a Grey Hat Hacker do?
    Unethically hacks a network to look for weaknesses
    Ethically hacks a network to look for weaknesses
    Hacks companies just for fun, not to cause any damage
    Hacks a network, and then offers to fix the breaches for a fee
    45s
    3.6.2

Teachers give this quiz to your class