Preview

Ecdl

Satisfactory Essays
Open Document
Open Document
2612 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ecdl
BCS IT User – Syllabus Version 1.0 – Sample Test Security for IT Users - Level 1 Version SampleMQTB/1.0/SI1/v1.1

SAMPLE TEST
There are 36 questions in this test. Each question has only one correct answer: A, B, C or D. You have 45 minutes to complete them.

Tasks. On your Learner Drive, find and open the answerfile.doc document. Enter your name in the space provided. Use this document to record your answers to the relevant questions. 1. Which one of the following describes spam? A. Gathering information about a person or organisation without their knowledge. B. Performing an unauthorised, usually malicious, action such as erasing files. C. Putting unnecessary load on the network by making copies of files. D. Sending unwanted bulk messages. Enter A, B, C, or D in answerfile.doc in the space for question 1. 2. Which one of the following can protect a computer from the risk of unwanted emails? A. Anti-spam software. B. Anti-virus software. C. Anti-spyware software. D. PC diagnostic software. Enter A, B, C, or D in answerfile.doc in the space for question 2.

Marks.

[1 Mark].

[1 Mark].

SampleMQTB/1.0/SI1/v1.1 © British Computer Society

SAMPLE TEST

Page 1 of 10

3.

Which one of the following could lead to the spread of a malicious program? A. Using only software that has been checked for viruses. B. Maintaining regularly updated anti-virus software. C. Opening only virus-checked file attachments from known sources. D. Using a USB Flash Drive from an unknown source to exchange data. Enter A, B, C, or D in answerfile.doc in the space for question 3.

[1 Mark].

4.

Which one of the following protects a computer from the risk of malicious programs? A. PC diagnostic software. B. Web tracking software. C. Anti-spam software. D. Anti-spyware software. Enter A, B, C, or D in answerfile.doc in the space for question 4.

[1 Mark].

5.

Which one of the following describes why it is important to update antivirus software regularly? A. To

You May Also Find These Documents Helpful

  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    9. A student writes a report using a word processor, saving the repot in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he pasts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files as defined by a computer OS?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    CHAPTER3 REVEIW

    • 527 Words
    • 3 Pages

    9. Which of the following are some of the important features supplied by files as defined by a computer OS (choose 3)…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    3. Malware Install antivirus software Theft Lock computer to desk or encrypt hard drive Network attacks Implement firewall…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    16. I chose understanding security and safe computing from the bulleted list of options to choose from in the help and support window. I learned that there are 4 ways you can protect your pc from security threats.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    it320 assignment 1-3

    • 1779 Words
    • 8 Pages

    9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files defined by a computer OS? ()…

    • 1779 Words
    • 8 Pages
    Good Essays
  • Good Essays

    2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?…

    • 787 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)…

    • 713 Words
    • 3 Pages
    Satisfactory Essays