Soltiamon Christian School System 
ICT First Quiz - Topic Information and Computer Security 
Direction: Answer all questions (Multiple Choice) 
Class: 10th Grade A

A digital illustration of a secure computer environment, featuring a lock, firewall graphics, and symbols representing cybersecurity, with a modern tech aesthetic.

Information and Computer Security Quiz

Welcome to the ICT First Quiz focusing on Information and Computer Security! Test your knowledge and understanding of important concepts related to computer security.

This quiz consists of 11 multiple-choice questions designed to assess your comprehension of:

  • Passwords and their importance
  • Recognizing computer threats
  • Understanding backup and data security
  • The role of firewalls
11 Questions3 MinutesCreated by ProtectingData27
Ques1. Passwords enable users to
(a) get into the system quickly
(b) make efficient use of time
(c) retain confidentiality of files
(d) simplify file structures
Ques2. Which will not harm computer resources
(a) firewall
(b) Virus
(c) Trojan horse
(d) None of the above
Ques3. A Program designed to destroy data on your computer which can travel to “infect” other computers is called a _
(a) disease
(b) torpedo
(c) hurricane
(d) virus
Ques4. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running in the event of a system crash or failure
(d) All of these
Ques5. A computer checks the _____ of user names and passwords for a match before granting access.
(a) Website
(b) Network
(c) Backup file
(d) Data base
Ques6. All of the following are examples of real security and privacy risks EXCEPT:
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
Ques7. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) THe Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
Ques8. __ is a computer crime in which criminal breaks into a computer system for exploring details of information etc.
(a) Hacking
(b) Spoofing
(c) Eavesdropping
(d) Phishing
Ques9. Firewalls are used to protect against __
(a) unauthorized Attacks
(b) virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
Question10: Back up of the data files will help to prevent .
(a) loss of confidentiality
(b) duplication of data
(c) virus infection
(d) loss of data
{"name":"Soltiamon Christian School System ICT First Quiz - Topic Information and Computer Security Direction: Answer all questions (Multiple Choice) Class: 10th Grade A", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Welcome to the ICT First Quiz focusing on Information and Computer Security! Test your knowledge and understanding of important concepts related to computer security.This quiz consists of 11 multiple-choice questions designed to assess your comprehension of:Passwords and their importanceRecognizing computer threatsUnderstanding backup and data securityThe role of firewalls","img":"https:/images/course8.png"}
Make your own Survey
- it's free to start.