Ecdl

Only available on StudyMode
  • Download(s) : 119
  • Published : April 8, 2013
Open Document
Text Preview
BCS IT User – Syllabus Version 1.0 – Sample Test Security for IT Users - Level 1 Version SampleMQTB/1.0/SI1/v1.1

SAMPLE TEST
There are 36 questions in this test. Each question has only one correct answer: A, B, C or D. You have 45 minutes to complete them.

Tasks. On your Learner Drive, find and open the answerfile.doc document. Enter your name in the space provided. Use this document to record your answers to the relevant questions. 1. Which one of the following describes spam? A. Gathering information about a person or organisation without their knowledge. B. Performing an unauthorised, usually malicious, action such as erasing files. C. Putting unnecessary load on the network by making copies of files. D. Sending unwanted bulk messages. Enter A, B, C, or D in answerfile.doc in the space for question 1. 2. Which one of the following can protect a computer from the risk of unwanted emails? A. Anti-spam software. B. Anti-virus software. C. Anti-spyware software. D. PC diagnostic software. Enter A, B, C, or D in answerfile.doc in the space for question 2.

Marks.

[1 Mark].

[1 Mark].

SampleMQTB/1.0/SI1/v1.1 © British Computer Society

SAMPLE TEST

Page 1 of 10

3.

Which one of the following could lead to the spread of a malicious program? A. Using only software that has been checked for viruses. B. Maintaining regularly updated anti-virus software. C. Opening only virus-checked file attachments from known sources. D. Using a USB Flash Drive from an unknown source to exchange data. Enter A, B, C, or D in answerfile.doc in the space for question 3.

[1 Mark].

4.

Which one of the following protects a computer from the risk of malicious programs? A. PC diagnostic software. B. Web tracking software. C. Anti-spam software. D. Anti-spyware software. Enter A, B, C, or D in answerfile.doc in the space for question 4.

[1 Mark].

5.

Which one of the following describes why it is important to update antivirus software regularly? A. To ensure the software identifies old viruses. B. To protect your computer from all known viruses. C. To protect your computer from unwanted bulk messages. D. To prevent the spread of malicious programs on the Internet. Enter A, B, C, or D in answerfile.doc in the space for question 5. Save your document keeping the same filename answerfile.doc.

[1 Mark].

6.

Which one of the following describes what you should do if you receive a chain letter email? A. Forward the email. B. Download it onto your system. C. Delete the email. D. Send a read receipt. Enter A, B, C, or D in answerfile.doc in the space for question 6.

[1 Mark].

SampleMQTB/1.0/SI1/v1.1 © British Computer Society

SAMPLE TEST

Page 2 of 10

7.

Which one of the following describes a computer hacker? A. A skilled programmer who uses authorised access to exploit information available on a computer. B. A skilled programmer who secretly invades computers without authorisation. C. A skilled programmer who writes programs to train new employees. D. A skilled programmer who helps in the installation of new software for an organisation. Enter A, B, C, or D in answerfile.doc in the space for question 7.

[1 Mark].

8.

Which one of the following describes why firewalls are used? A. To prevent unauthorised access by incoming transmissions. B. To prevent destruction of a computer in the event of a fire. C. To enable easy downloading of data from web sites. D. To detect and disable viruses already on a computer. Enter A, B, C, or D in answerfile.doc in the space for question 8.

[1 Mark].

9.

Which one of the following is MOST likely to be a hoax? A. An email from a friend you have not seen recently. B. An email with an attachment sent by a colleague using their personal email address. C. An email asking you to go to a website for a free computer scan. D. An email advertisement from a local shop you subscribe to. Enter A, B, C, or D in answerfile.doc in the space for question 9....
tracking img