multiple choice - iis windows serverweb1.crypt.gloucs.sch.uk/ict/resources/year 10/b061/topic... ·...

8
Topic 5 – Keeping data safe and secure Name: Topic 5 – Keeping data safe and secure Keeping data safe and secure anagrams Here are some words or phrases that have been jumbled up. The words are connected with keeping data safe and secure. Can you work out what they are? There is a clue to help you. 1 Prince tony Hint: Method of keeping data private. Answer: __________________________________________________________________ 2 Fair well Hint: Used to keep hackers out. Answer: __________________________________________________________________ 3 Sack her Hint: People who gain illegal access to a computer. Answer: __________________________________________________________________ 4 Cress ruin van Hint: Software used to scan for viruses. Answer: __________________________________________________________________ 5 Manic fun lot Hint: Problem with equipment not working. Answer: __________________________________________________________________ 6 Buck pa Hint: You must remember to take this. Answer: __________________________________________________________________ 7 Cattleman thiefHint: Can be sent with an email. Answer: __________________________________________________________________ 8 Beetle raid Hint: Not by accident. 1 | Page

Upload: doantuong

Post on 11-May-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

Topic 5 – Keeping data safe and secureKeeping data safe and secure anagrams Here are some words or phrases that have been jumbled up. The words are connected with keeping data safe and secure. Can you work out what they are? There is a clue to help you.

1 Prince tony Hint: Method of keeping data private.

Answer: __________________________________________________________________

2 Fair well Hint: Used to keep hackers out.

Answer: __________________________________________________________________

3 Sack her Hint: People who gain illegal access to a computer.

Answer: __________________________________________________________________

4 Cress ruin van Hint: Software used to scan for viruses.

Answer: __________________________________________________________________

5 Manic fun lot Hint: Problem with equipment not working.

Answer: __________________________________________________________________

6 Buck pa Hint: You must remember to take this.

Answer: __________________________________________________________________

7 Cattleman thief Hint: Can be sent with an email.

Answer: __________________________________________________________________

8 Beetle raid Hint: Not by accident.

Answer: __________________________________________________________________

9 Cress lamb Hint: What encryption does to the data.

Answer: __________________________________________________________________

10 Error sure Hint: Mistake made by the user.

Answer: __________________________________________________________________

1 | P a g e

Page 2: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

The trouble caused by viruses

Viruses cause computers users all sorts of problems and you may have had problems with them yourself. Viruses can cause organizations huge amounts of problems that cost a lot of money to put right.For this activity you have to use the Internet to find some examples of the problems caused by virus attacks.Collect your research material and below talk about four cases where viruses have caused problems. (Marks – 16 (Example marking - One for a case, one for cause, one for consequences, one for lessons learnt * 4)

2 | P a g e

Page 3: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

Keeping viruses outThere are many ways you can keep viruses out of an ICT system.You have to produce a poster for the computer room outlining what steps a user can take to keep viruses out of their system. Place a screenshot of it below – Marks 10

3 | P a g e

Page 4: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

Multiple Choice

1 What are backup copies?A Copies kept for managementB Copies kept for security purposesC Copies of lists of passwordsD Copies of documentation

ANSWER:

2 Why should backup copies be kept off-site?A It is harder to access themB If the building is destroyed, then the backup copies won’t beC It is cheaper to keep them off-siteD It saves the effort of keeping them handy

ANSWER:

3 Here are some hard disk drive capacities. Which one would hold the largest amount of data?A 1 TerabyteB 1 GigabyteC 1 MegabyteD 1 Kilobyte

ANSWER:

4 Unauthorized access to a computer system is called which one of these?A Data protectionB PhishingC WormD Hacking

ANSWER:

5 Which one of the following statements about firewalls is false?A Firewalls prevent communication that is not allowed between two networks B Firewalls can be software

4 | P a g e

Page 5: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

C Firewalls can be hardwareD Firewalls can encourage the spreading of viruses

ANSWER:

6 Which one of the following best describes the purpose of a firewall?A It is used to protect a high security network when connected to a low

security network such as the InternetB It is used to connect a computer to the InternetC It is used to enable several computers in a network to gain access to the

InternetD It is used to stop viruses spreading around an internal network

ANSWER:

7 Threats to an ICT system may be human or non-human in origin.Which one of the following is non-human in origin?A EarthquakesB VirusesC User errorsD Hackers

ANSWER:

8 Which one of the following is not a method of preventing unauthorized access to a computer?A Keyboard locksB Swipe cardsC Disk drive locksD Lists of passwords

ANSWER:

9 A user who wants to gain access to an ICT system needs to enter a password first. Most systems only allow you to try a password a few times before they lock you out of the system completely. Which one of these is the correct reason for this?A It may be someone unauthorized trying to enter different passwords to hack

into the systemB The password needs to be entered several times before it will workC To prevent viruses entering the systemD To cause annoyance to the user

5 | P a g e

Page 6: Multiple Choice - IIS Windows Serverweb1.crypt.gloucs.sch.uk/ict/Resources/Year 10/B061/Topic... · Web view1 Gigabyte 1 Megabyte 1 Kilobyte ANSWER: Unauthorized access to a computer

Topic 5 – Keeping data safe and secure Name:

ANSWER:

10 Encryption works by which one of these?A Coding and decoding dataB Sending the password as an emailC Asking for the data to be kept secretD By signing the Official Secrets Act

ANSWER:

Text book questions

Questions A Page 105

1aBC2aBC

Questions B Page 108

1aB234aB

Questions C Page 111

1aBC2aBc

6 | P a g e