1.
A good password policy will force users to...
Correct Answer
D. Change password every month
Explanation
A good password policy will force users to change their password every month. This is because regularly changing passwords helps to enhance security by reducing the risk of unauthorized access. By changing passwords frequently, it becomes more difficult for hackers to guess or crack passwords, as they have less time to exploit them. This practice also helps to mitigate the impact of compromised passwords, as they become outdated and less useful over time. Additionally, changing passwords regularly encourages users to create stronger and more complex passwords, further strengthening the overall security of the system.
2.
A strong password will be...
Correct Answer
C. A combination of at least 8 mixed cause letters and numbers
Explanation
A strong password should be a combination of at least 8 mixed case letters and numbers. This means that the password should include both uppercase and lowercase letters, as well as numbers. Using a combination of different characters makes the password more complex and harder to guess or crack. This helps to enhance the security and protect the user's account or information from unauthorized access or hacking attempts.
3.
Having an off-site backup copy of computer files...
Correct Answer
D. Preserves data that can be restored if there is a flood or fire
Explanation
Having an off-site backup copy of computer files preserves data that can be restored if there is a flood or fire. This means that even if the original files are destroyed or inaccessible due to a disaster, the off-site backup ensures that the data is still available and can be recovered. This is important for maintaining the integrity and continuity of important files and information, protecting against potential data loss or damage.
4.
A firewall...
Correct Answer
B. Monitors incoming network traffic to protect from external attacks
Explanation
A firewall is a network security device that monitors incoming network traffic to protect a computer or network from external attacks. It acts as a barrier between an internal network and the external network, filtering and analyzing incoming traffic to identify and block any potentially harmful or unauthorized access attempts. By monitoring incoming network traffic, a firewall helps to prevent unauthorized access, protect sensitive data, and ensure the security and integrity of the network.
5.
Application software should be updated regularly to...
Correct Answer
A. Install fixes and enhancements
Explanation
Application software should be updated regularly to install fixes and enhancements. By updating the software, any bugs or vulnerabilities can be fixed, improving the overall performance and security of the application. Additionally, updates often include new features and enhancements that can enhance the user experience and provide additional functionality. Regular updates also ensure that the software remains compatible with the latest operating systems and hardware, preventing any compatibility issues.
6.
Which one of the following is not a type of malware?
Correct Answer
C. USB
Explanation
USB is not a type of malware. It is a type of hardware, specifically a Universal Serial Bus, used for connecting devices to a computer. Malware refers to malicious software designed to harm or exploit a computer system, while USB is a physical device used for data transfer.
7.
Malware is...
Correct Answer
B. Software designed to do harm to your system
Explanation
Malware refers to malicious software that is specifically created to cause harm to computer systems, networks, or user data. It includes various types of harmful programs such as viruses, worms, Trojans, ransomware, spyware, and adware. These malicious programs can disrupt the normal functioning of a system, steal sensitive information, corrupt files, and even render the system completely unusable. The primary intent of malware is to exploit vulnerabilities and compromise the security of a system, making it a significant threat to users and organizations.
8.
A computer infected with a virus is likely to have files that are
Correct Answer
D. Corrupted
Explanation
A computer infected with a virus is likely to have files that are corrupted. When a computer is infected with a virus, the virus can modify or delete files, causing them to become corrupted. This means that the files may no longer be readable or usable by the computer or the user. Corruption can lead to data loss or system malfunction, and it is one of the common consequences of a virus infection.
9.
There is a risk of malware infecting a computer when...
Correct Answer
C. Files are downloaded from an unknown source
Explanation
Downloading files from an unknown source poses a risk of malware infecting a computer. When files are downloaded from an unknown source, there is a higher chance of those files containing malicious software or viruses. These files may be disguised as legitimate programs or documents, tricking the user into unknowingly installing malware on their computer. It is important to only download files from trusted and reputable sources to minimize the risk of malware infection.
10.
There is a risk that a virus could enter a smart phone when...
Correct Answer
B. Using the Internet
Explanation
Using the Internet poses a risk of a virus entering a smartphone because the Internet allows for the transfer of data and information from various sources. When accessing the Internet, whether through browsing websites, downloading files, or using online services, there is a possibility of encountering malicious content or websites that can infect the smartphone with a virus. This can happen through clicking on malicious links, downloading infected files, or visiting compromised websites. Therefore, using the Internet on a smartphone increases the vulnerability to potential virus infections.
11.
Running an anti-virus program will...
Correct Answer
B. Scan the hard drive to identify and remove harmful software
Explanation
Running an anti-virus program will scan the hard drive to identify and remove harmful software. Anti-virus programs are designed to detect and eliminate viruses, malware, and other malicious software that may be present on a computer. By regularly scanning the hard drive, the program can identify any potential threats and take appropriate action to remove them, thereby ensuring the security and integrity of the system.
12.
To reduce eyestrain you should...
Correct Answer
C. Take frequent breaks
Explanation
To reduce eyestrain, taking frequent breaks is recommended. This is because staring at a screen for extended periods can cause strain on the eyes, leading to discomfort and fatigue. By taking regular breaks, such as looking away from the screen every 20 minutes or so, the eyes are given a chance to rest and refocus. This can help prevent eye strain and reduce symptoms like dryness, blurred vision, and headaches.
13.
You can save energy by ....
Correct Answer
D. Set the screen to switch off automatically if idle.
Explanation
Setting the screen to switch off automatically if idle helps in saving energy because when the screen is not in use, it consumes unnecessary power. By enabling the automatic switch-off feature, the screen will turn off after a certain period of inactivity, reducing energy consumption and contributing to energy savings.
14.
A software application that allows users to enlarge selected parts of the content displayed on the screen is a...
Correct Answer
B. Screen magnifier
Explanation
A screen magnifier is a software application that allows users to enlarge selected parts of the content displayed on the screen. It helps individuals with visual impairments or those who have difficulty reading small text or viewing details on the screen. By zooming in on specific areas, users can easily read or view content that would otherwise be too small or difficult to see.
15.
A software application that allows the computer to respond to human speech is a...
Correct Answer
A. Speech recognition utility
Explanation
A software application that allows the computer to respond to human speech is known as a speech recognition utility. This type of software is designed to interpret and understand spoken words, converting them into text or performing specific actions based on the user's commands. It enables users to interact with their computer through voice commands, making it a useful tool for individuals with mobility impairments or those who prefer hands-free operation.