Вы находитесь на странице: 1из 7

EnlightKS ECDL/ICDL - IT Security 1.0 - Diag.

Eng

European Computer Driving Licence, ECDL, International Computer Driving Licence, ICDL, e-Citizen and related
logos are all trademarks of The European Computer Driving Licence Foundation Limited (ECDL Foundation).

The Diagnostic Assessment EnlightKS ECDL/ICDL - IT Security 1.0 - Diag. Eng has been developed by PSI and
has been approved by ECDL Foundation for use by candidates preparing to sit the corresponding Certification Test.

This is not a test, candidates will not receive a certificate or results when availing of this product.

The test is complete

Your score

Total result 0%

Result by Category
Security Concepts 0%
Malware 0%
Network Security 0%
Secure Web Use 0%
Communications 0%
Secure Data Management 0%

Answer Listing
Item Text Answer Feedback Result

Security Concepts

Which one of the following prevents unauthorised users from accessing data? Your Answer Correct Answer Unanswered
Unanswered Using a strong
password.

Which one of the following is NOT a possible threat to data? Your Answer Correct Answer Unanswered
Unanswered Screen resolution.

Which one of the following is a main principle of data protection legislation? Your Answer Correct Answer Unanswered
Unanswered To protect personal
data.

Which one of the following is an example of a force majeure threat to data? Your Answer Correct Answer Unanswered
Unanswered Fire.

Which one of the following is a valid reason for protecting commercially Your Answer Correct Answer Unanswered
sensitive information? Unanswered To prevent theft of
financial details.
Which one of the following is a method of social engineering? Your Answer Correct Answer Unanswered
Unanswered Sending e-mail that
falsely claims to be
from a legitimate
source.

Which one of the following is a method of identity theft? Your Answer Correct Answer Unanswered
Unanswered Skimming.

Which one of the following is a disadvantage of data encryption? Your Answer Correct Answer Unanswered
Unanswered The strength of the
encryption is
decreased if the key
has few characters.

Which one of the following describes a direct consequence of identity theft? Your Answer Correct Answer Unanswered
Unanswered Your e-mail account
may be used by
someone else.

Which one of the following best describes why you should protect your Your Answer Correct Answer Unanswered
personal information? Unanswered To reduce the risk of
identity theft.

Which one of the following best describes the relationship between data and Your Answer Correct Answer Unanswered
information? Unanswered Data is the raw input
that information is
based on.

Which one of the following best describes the purpose of social engineering? Your Answer Correct Answer Unanswered
Unanswered Information
gathering.
Which one of the following best describes the effect of enabling an Your Answer Correct Answer Unanswered
application to run macros? Unanswered Your computer will
be more at risk from
viruses.

Which one of the following best describes how ICT guidelines are used in an Your Answer Correct Answer Unanswered
organisation? Unanswered To provide
employees with a set
of rules that defines
general computer
use.

Which one of the following best describes cybercrime? Your Answer Correct Answer Unanswered
Unanswered Illegal activities by
means of computer
networks.

Which one of the following best describes cracking? Your Answer Correct Answer Unanswered
Unanswered Using software to
find out system
passwords.
..................... is a characteristic of information security that ensures the Your Answer Correct Answer Unanswered
nondisclosure of data except to another authorised person. Unanswered Confidentiality.
Open the file named Internet.doc from \. Apply the password network to Unanswered
open the document and then save the Internet file. If a question is shown
asking to convert to an Office XML format, click No.
Suggested solution:
Choose the Open command.

Word 2003:
When the document is opened,
choose the Save As command.
In the Save As window, click the
Tools button (located top right)
and choose Security Options....
In the Security window,
enter the password network to
open the file.
Click OK.
In the Confirm Password window,
re-enter the password and click OK.
In the Save As window, click the
Save button.

Word 2007 and 2010:


When the document is opened,
choose the Save As command.
In the Save As window, click the
Tools button (located next to the
Save button) and choose General
Options....
In the General Options window,
enter the password network to
open the file.
Click OK.
In the Confirm Password window,
re-enter the password and click OK.
In the Save As window, click the
Save button.

Word 2013:
When the document is opened,
choose the Save As command,
then click the Browse button.
In the Save As window, click the
Tools button (located next to the
Save button) and choose General
Options....
In the General Options window,
enter the password network to
open the file.
Click OK.
In the Confirm Password window,
re-enter the password and click OK.
In the Save As window, click the
Save button.

Malware
Which one of the following is NOT a characteristic of adware? Your Answer Correct Answer Unanswered
Unanswered It is impossible to
remove from the
computer.

Which one of the following is a characteristic of anti-virus software? Your Answer Correct Answer Unanswered
Unanswered It scans the
computer for
malware.

Which one of the following is a characteristic of a virus? Your Answer Correct Answer Unanswered
Unanswered A computer virus can
spread from what
appears to be a
normal file.
Which one of the following best describes why anti-virus software should be Your Answer Correct Answer Unanswered
updated regularly? Unanswered To protect against
new computer
viruses.
Which one of the following best describes what can be used to conceal Your Answer Correct Answer Unanswered
malware on a computer? Unanswered Trojans.
Which one of the following best describes the quarantine in anti-virus Your Answer Correct Answer Unanswered
software? Unanswered Infected files that
cannot be deleted
nor cleaned during
scanning of files are
placed here.

Which one of the following best describes malware? Your Answer Correct Answer Unanswered
Unanswered Software that is
designed to do
harmful actions on a
computer system.

Network Security

Which one of the following should you be aware of when using an Your Answer Correct Answer Unanswered
unprotected wireless network? Unanswered Your data will be
accessible to
outsiders.
Which one of the following passwords is an example of good practice? Your Answer Correct Answer Unanswered
Unanswered jaCkbRown_23-11-
1990!
Which one of the following is needed when connecting to a protected Your Answer Correct Answer Unanswered
wireless network? Unanswered Password.
Which one of the following is most likely to manage the authentication, Your Answer Correct Answer Unanswered
authorisation and accounting within a computer network? Unanswered The network
administrator.
Which one of the following is known by the term WEP? Your Answer Correct Answer Unanswered
Unanswered Wired Equivalent
Privacy

Which one of the following is a security implication when connecting to a Your Answer Correct Answer Unanswered
network? Unanswered Your private
information may be
more at risk.
Which one of the following is a common biometric security technique used in Your Answer Correct Answer Unanswered
access control? Unanswered Fingerprint.
Which one of the following best describes the purpose of a company network Your Answer Correct Answer Unanswered
account? Unanswered To provide users with
services like file
sharing, e-mail and
Internet access.
Which one of the following best describes the function of a firewall? Your Answer Correct Answer Unanswered
Unanswered A firewall blocks
unauthorised access
from outside a
network.
Which one of the following best describes how to ensure only authorised Your Answer Correct Answer Unanswered
users can access a wireless network? Unanswered Make sure that the
wireless network is
password protected.

Secure Web Use

Which part of https://www.security.org indicates that it is a secure website? Your Answer Correct Answer Unanswered
Unanswered https
Which one of the following would be a reason to NOT allow cookies in the Your Answer Correct Answer Unanswered
browser settings? Unanswered If you have concerns
about your privacy.
Which one of the following should you be aware of when using a social Your Answer Correct Answer Unanswered
networking site? Unanswered Grooming.
Which one of the following is used to increase the security in Web sites? Your Answer Correct Answer Unanswered
Unanswered Digital certificates.
Which one of the following is an online activity that should only be Your Answer Correct Answer Unanswered
undertaken on a secure web page? Unanswered Purchasing a gift.
Which one of the following best describes why you should NOT disclose Your Answer Correct Answer Unanswered
personal confidential information on social networking sites? Unanswered The information may
be used by other
users to steal your
identity.
Which one of the following best describes when the auto complete function Your Answer Correct Answer Unanswered
should be disabled when completing an online form? Unanswered When entering your
credit card
information.
Which one of the following best describes the term pharming? Your Answer Correct Answer Unanswered
Unanswered Deliberately
misdirecting users to
a fraudulent website.
Which one of the following best describes parental control software? Your Answer Correct Answer Unanswered
Unanswered It restricts access to
chat, file sharing or
web browsing.
Which one of the following best describes a one-time password? Your Answer Correct Answer Unanswered
Unanswered A password that is
valid for only one
login session.
Which one of the following best describes a cookie? Your Answer Correct Answer Unanswered
Unanswered A text file stored on
the hard disk when a
website is visited.
Which one of the following applications would you use to delete browsing Your Answer Correct Answer Unanswered
history? Unanswered Internet Explorer.

Communications

Which one of the following is an example of how a digital signature might be Your Answer Correct Answer Unanswered
used? Unanswered To verify electronic
documents.

Which one of the following helps ensure confidentiality when using instant Your Answer Correct Answer Unanswered
messaging? Unanswered Not revealing
personal
information.
Which one of the following best describes the purpose of decrypting e-mail? Your Answer Correct Answer Unanswered
Unanswered It makes e-mail
readable for anyone.
Which one of the following best describes phishing? Your Answer Correct Answer Unanswered
Unanswered E-mail with the
intent to trick the
recipient into
revealing financial
details.

Which one of the following best describes a known security vulnerability of Your Answer Correct Answer Unanswered
instant messaging (IM)? Unanswered Message
attachments can
contain malware.
Which one of the following actions is most likely to spread malware? Your Answer Correct Answer Unanswered
Unanswered Opening an e-mail
attachment from an
unknown sender.

Secure Data Management

Which one of the following should be carried out to prevent loss of data? Your Answer Correct Answer Unanswered
Unanswered Backups.

Which one of the following is an important reason for permanently deleting Your Answer Correct Answer Unanswered
data from a device? Unanswered It makes the data
completely
inaccessible.
Which one of the following is an important part of a back-up procedure? Your Answer Correct Answer Unanswered
Unanswered Store the files in a
different location.
Which one of the following is a method to ensure data is permanently Your Answer Correct Answer Unanswered
destroyed? Unanswered Make sure the
storage media is
physically
destructed.
Which one of the following does NOT ensure that data is permanently Your Answer Correct Answer Unanswered
destroyed? Unanswered Moving data to the
recycle bin
Which one of the following can be used to reduce the risk of computer theft? Your Answer Correct Answer Unanswered
Unanswered Security cable.
Make a backup copy of the file Budget.xls by saving it to the folder December Suggested solution: Unanswered
backup in \.
Excel 2003, 2007, 2010:
Choose the Save As command.
In the Save As window, open the
December Backup folder and click
Save.

Excel 2013:
Choose the Save As command and
then click the Browse button.
In the Save As window, open the
December Backup folder and click
Save.

Вам также может понравиться