Which of the examples below is NOT a threat to data security?
Brute force attack
Malware
Jitterbug
What is cipher text?
Decoded message
Encoded message
Which one of the passwords below is the most secure?
Supercalifragilisticexpialidocious
Harry5tyle5ismy#1
Fluffy2002
For another user to be able to only view a file, rather than being able to edit it, what access right would you allow them?
Read
Write
Execute
If data is backed up on cloud, where are the files stored?
On a hard drive
In the sky
On the internet
What can you use to protect a network from intruders?
Firewall
Fireball
Fireblast
"Malware is the combination of the words malicious and software". This statement is:
True
False
What is it called when a computer program makes multiple copies of itself?
Computer worm
Computer snakeskin
Computer sheep
Which of the examples below is a disadvantage of cloud computing?
You need a strong and reliable internet connection
Gamers have to buy new hardware and game disks
Multiple users cannot access your files
Emails encrypted by public key cryptography can only be decrypted with what?
A password
A public key
A private key