GCSE Computer Science MCQS And Answers

2y ago
125 Views
9 Downloads
258.49 KB
10 Pages
Last View : 1m ago
Last Download : 2m ago
Upload by : Joanna Keil
Transcription

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQSQuestion 1: An example of social engineering (4-6)VirusesWormsTelephone IVR PhishingTrojan HorsesQuestion 2: A network policy (1-3)PhishingVirusData TheftAcceptable Use PolicyQuestion 3: Malware (1-3)Are different types of threats to computer systemsIs a manufacturer of computer partsAre hard to find on the internetDistribution is completely legalQuestion 4: Viruses (4-6)üüüüDo not need to attach to a programNeed to attach to a programA type of social engineeringDesigned to access a computer by misleading users of its intent by prompting todownload a programQuestion 5: Worms (4-6)Do not need to attach to a programNeed to attach to a programA type of social engineeringDesigned to access a computer by misleading users of its’ intent by prompting todownload a programQuestion 6: Trojan Horses (7-9)Does not need to attach to a programCan only occur when a computer is not connected to a networkA type of social engineeringDesigned to access a computer by misleading users of its’ intent by prompting todownload a programQuestion 7: How many viruses are made each day? (4-6)103054,00082,0001üüü OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQSQuestion 8: What can viruses affect? (1-3)KeyboardHard driveRAMAll the aboveQuestion 9: How do hackers use viruses? (1-3)To make a computer unusableTo get someone’s personal informationTo find out card detailsAll of the aboveQuestion 10: Sending requests to a single server using hijacked machines (1-3)PhishingDDOSWormVirusQuestion 11: Social engineering, phishing and worms are examples of (4-6)VirusesScamsData interceptionMalwareQuestion 12: Data travels across networks in (4-6)NibblesPartsBytesPacketsQuestion 13: Uses a number of computers over a network of infected machineswhich send requests to a website which would bring it offline (1-3)SQLDDOSUSBWLANQuestion 14: Organisations can protect themselves from SQL injection attacks bydownloading and installing � OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQSQuestion 15: An effect of SQL injection (7-9)Full access to the target computerNetwork access to the computer onlyAbility to edit all filesAttackers can access the database only and manipulate dataQuestion 16: An SQL injection attack would cause unauthorised access to (1-3)FilesEntire computerDatabasesSome filesQuestion 17: A network of computers infected with malicious software andcontrolled as part of a group without the owners’ knowledge (4-6)VirusStuxnetRingBotnetQuestion 18: The ’official title’ of the person who is responsible for exploringvulnerabilities of computer systems and reporting of this in an organization (4-6)Penetration testerSystems administratorNetwork managerForensic technicianQuestion 19: Network forensics primarily involves (1-3)Examination of computersThe examination of data sent across a networkExamination of phonesThe examination of computer dataQuestion 20: An example of a network forensic technique is (1-3)Packet sniffingRunning anti-virusUpdating the computerSyncing with the server3 OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQSQuestion 21: Law enforcement agencies can intercept data under what law? (7-9)Data Protection ActRegulation of Investigatory Powers Act (RIPA)Investigatory Powers ActComputer Misuse ActQuestion 22: A user gaining access to a system or intercepting user data withoutpermission would be breaching which law? (4-6)Data Protection ActRegulation of Investigatory Powers Act (RIPA)Investigatory Powers ActComputer Misuse ActQuestion 23: Software that performs a ‘barrier’ between a potential attacker andthe computer system (4-6)Anti-virusFirewallWindows UpdateDisk DefragmenterQuestion 24: Defines how a system can be secured through specific rules orrequirements (4-6)Security PolicyData Retention PolicyPassword PolicySigning in bookQuestion 25: These define access permissions for a user (1-3)Group PermissionsUser Access LevelsUser MaintenanceGroup and User SettingsQuestion 26: Identify security requirements with passwords (4-6)Use password complexity rulesRequire two-factor authenticationLimit of the number of password guessesAll of the above4 OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQSQuestion 27: What is encryption? (1-3)Where only the sender and recipient can read the messageA method of bypassing virusesA form of anti-virusWhere data is translated into code so that only authorised users, or users with the keycan decrypt itQuestion 28: What must a user need to decrypt a file? (7-9)CoinKeyTokenGraphQuestion 29: A Caeser Cipher uses what in order for decryption? (7-9)Token shiftGraph tokenShift key numberCoin numberQuestion 30: Typically, what level of access would a student in a school have onthe network? (7-9)Access to all folders on the networkFull accessAccess to own documents and the internetAccess to all printers5 OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQS ANSWERSQuestion 1: An example of social engineering (4-6)VirusesWormsTelephone IVR PhishingTrojan HorsesQuestion 2: A network policy (1-3)PhishingVirusData TheftAcceptable Use PolicyQuestion 3: Malware (1-3)Are different types of threats to computer systemsIs a manufacturer of computer partsAre hard to find on the internetDistribution is completely legalQuestion 4: Viruses (4-6)üüüüDo not need to attach to a programNeed to attach to a programA type of social engineeringDesigned to access a computer by misleading users of its intent by prompting todownload a programQuestion 5: Worms (4-6)Do not need to attach to a programNeed to attach to a programA type of social engineeringDesigned to access a computer by misleading users of its’ intent by prompting todownload a programQuestion 6: Trojan Horses (7-9)Does not need to attach to a programCan only occur when a computer is not connected to a networkA type of social engineeringDesigned to access a computer by misleading users of its’ intent by prompting todownload a programQuestion 7: How many viruses are made each day? (4-6)103054,00082,0006üüü OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQS ANSWERSQuestion 8: What can viruses affect? (1-3)KeyboardHard driveRAMAll the aboveQuestion 9: How do hackers use viruses? (1-3)To make a computer unusableTo get someone’s personal informationTo find out card detailsAll of the aboveQuestion 10: Sending requests to a single server using hijacked machines (1-3)PhishingDDOSWormVirusQuestion 11: Social engineering, phishing and worms are examples of (4-6)VirusesScamsData interceptionMalwareQuestion 12: Data travels across networks in (4-6)NibblesPartsBytesPacketsQuestion 13: Uses a number of computers over a network of infected machineswhich send requests to a website which would bring it offline (1-3)SQLDDOSUSBWLANQuestion 14: Organisations can protect themselves from SQL injection attacks bydownloading and installing � OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQS ANSWERSQuestion 15: An effect of SQL injection (7-9)Full access to the target computerNetwork access to the computer onlyAbility to edit all filesAttackers can access the database only and manipulate dataQuestion 16: An SQL injection attack would cause unauthorised access to (1-3)FilesEntire computerDatabasesSome filesQuestion 17: A network of computers infected with malicious software andcontrolled as part of a group without the owners’ knowledge (4-6)VirusStuxnetRingBotnetQuestion 18: The ’official title’ of the person who is responsible for exploringvulnerabilities of computer systems and reporting of this in an organization (4-6)Penetration testerSystems administratorNetwork managerForensic technicianQuestion 19: Network forensics primarily involves (1-3)Examination of computersThe examination of data sent across a networkExamination of phonesThe examination of computer dataQuestion 20: An example of a network forensic technique is (1-3)Packet sniffingRunning anti-virusUpdating the computerSyncing with the server8 OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQS ANSWERSQuestion 21: Law enforcement agencies can intercept data under what law? (7-9)Data Protection ActRegulation of Investigatory Powers Act (RIPA)Investigatory Powers ActComputer Misuse ActQuestion 22: A user gaining access to a system or intercepting user data withoutpermission would be breaching which law? (4-6)Data Protection ActRegulation of Investigatory Powers Act (RIPA)Investigatory Powers ActComputer Misuse ActQuestion 23: Software that performs a ‘barrier’ between a potential attacker andthe computer system (4-6)Anti-virusFirewallWindows UpdateDisk DefragmenterQuestion 24: Defines how a system can be secured through specific rules orrequirements (4-6)Security PolicyData Retention PolicyPassword PolicySigning in bookQuestion 25: These define access permissions for a user (1-3)Group PermissionsUser Access LevelsUser MaintenanceGroup and User SettingsQuestion 26: Identify security requirements with passwords (4-6)Use password complexity rulesRequire two-factor authenticationLimit of the number of password guessesAll of the above9 OCR 2017

GCSE (9–1)COMPUTER SCIENCEMCQs and AnswersUNIT 1.6 SECURITY SYSTEMS MCQS ANSWERSQuestion 27: What is encryption? (1-3)Where only the sender and recipient can read the messageA method of bypassing virusesA form of anti-virusWhere data is translated into code so that only authorised users, or users with the keycan decrypt itQuestion 28: What must a user need to decrypt a file? (7-9)CoinKeyTokenGraphQuestion 29: A Caeser Cipher uses what in order for decryption? (7-9)Token shiftGraph tokenShift key numberCoin numberQuestion 30: Typically, what level of access would a student in a school have onthe network? (7-9)Access to all folders on the networkFull accessAccess to own documents and the internetAccess to all printers We’d like to know your view on the resources we produce. By clicking on ‘Like’ or ‘Dislike’ you can help us to ensure that our resources work foryou. When the email template pops up please add additional comments if you wish and then just click ‘Send’. Thank you.Whether you already offer OCR qualifications, are new to OCR, or are considering switching from your current provider/awarding organisation,you can request more information by completing the Expression of Interest form which can be found here: www.ocr.org.uk/expression-of-interestLooking for a resource? There is now a quick and easy search tool to help find free resources for your ces/OCR Resources: the small printOCR’s resources are provided to support the delivery of OCR qualifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with theindividual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. OCR 2017 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work.OCR acknowledges the use of the following content: n/aPlease get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk10 OCR 2017

1 OCR 2017 GCSE 9 1 COMPUTER SCIENCE MCQs nd nswers UNIT 1.6 SECURITY SYSTEMS MCQS Question 1: An example of social engineering (4-6) ü Viruses Worms Telephone IVR Phishing Trojan Horses Question 2: A network policy (1-3) ü Phishing Virus Data Theft Acceptable Use Policy Question

Related Documents:

MCQs 261-330 115 EMQs 331-340 139 6 Special senses MCQs 341-384 149 EMQs 385-394 163 7 Urinary system MCQs 395-434 171 EMQs 435-444 185 8 Endocrine system MCQs 445-501 193 EMQs 502-512 211 9 Reproductive system MCQs 513-567 219 EMQs 568-576 237 l0. General questions MCQs 577-639 245 EMQs 640-649 265 11 Sport and exercise physiology MCQs 650-686 .

GCSE Computer Science - OCR GCSE Geography - AQA GCSE History - AQA GCSE Triple Science [Biology, Chemistry & Physics] - AQA. Computer Science OCR GCSE For More Information Contact: Mrs Roche at the Academy. This GCSE specification encourages candidates to explore how

Specifications for GCSE Physics include the physics and How Science Works content from GCSE Science and GCSE Additional Science. In addition, they include further extension topics in physics. Taken together, GCSE Biology, GCSE Chemistry and GCSE Physics cover the entire science Programm

MHT-CET Syllabus. Exhaustive subtopic wise coverage of MCQs. Notes, Shortcuts, Mindbenders, Formulae provided in each chapter. Various competitive exam questions updated till the latest year. Includes MCQs from NEET 2016, 2017 and 2018. Includes MCQs upto MHT-CET 2018. Evaluation test provided at the end of each chapter.

SHAPING A BETTER WORLD SINCE 1845. VIRTUAL OPEN DAYS 10 –12 SEPTEMBER 2020 . Average 6B (1A in profile) at GCSE or average BBB at AS-level . PPE 1A 6B at GCSE or BBB at AS-level 1A 6B at GCSE or BBB at AS-level MEng GCSE - 6B GCSE - 6B Midwifery GCSE - 5B including Maths and Science GCSE - 5B inc

14 GCSE Maths in a Week (Foundation) GCSE MATHS EXAM STRUCTURE Your GCSE Maths (Foundation) examination is comprised ofthree sections: Paper 1: Non-Calculator 1 hour and 30 minutes 33.3% of GCSE Marks out of 80 Paper 2: Calculator 1 hour and 30 minutes 33.3% of GCSE Marks out of 80 Paper 3: Calculator 1 hour and 30 minutes 33.3% of GCSE Marks .

08/06/2020 AQA 7662/2 German ADV Paper 2 Writing GCE A EDEXL/GCSE 1MA1 3F Calculator (F) GCSE 9FC EDEXL/GCSE 1MA1 3H Calculator (H) GCSE 9FC OCR J560/03 Mathematics: Paper 3 Fnd Wrtn GCSE 9FC AQA 7405/2 Chemistry ADV Paper 2 GCE A EDEXL/GCSE 1ASO 02 Telescopic Astronomy GCSE 9FC OCR RO18/01

Certification Standard Animal Nutrition – V5 for January 2020 P a g e 7 81 Daily ration: Average total quantity of feedingstuffs, calculated on a moisture content of 12 %, required daily by an animal of a given species, age category and yield, to satisfy all its needs (Regulation 1831/2003).