0% found this document useful (0 votes)
57 views2 pages

F5 Ch6 WS (Risks To Data and Personal Information) - Answer

Uploaded by

g4b54kjr69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views2 pages

F5 Ch6 WS (Risks To Data and Personal Information) - Answer

Uploaded by

g4b54kjr69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

F.

5 Computer Worksheet Answer


Ch6 – Risks to data and personal information
Name: _______________ Form 5 ( ) No: _______ Date:___________ Mark: _________

A. Multiple choice questions: (15 marks @5 marks)


( B )1. Which one of these could prevent the risk to Kay’s work data caused by accidental deletion?
A) Anti-malware B) Backup C) Encryption D) Phishing
( C )2. Which one of these is used to control internet traffic entering a network?
A) Server B) Backup C) Firewall D) Encryption
( D )3. Judy sets file permissions on her online documents. Which on of these is a benefit do doing this?
A) Improves encryption B) Increases storage C) Quicker backup D) Secures data

B. Fill in the blanks: (44 marks @4 marks)


1. List four pieces of data from a bank card that a user is asked to enter when making an online payment.
Name of card security
card number expiry date
cardholder code (CSC)

2. State two methods used by an online system to authenticate a user.

Password, PINs, Biometric, Security Questions.

3. State two methods used by criminals to get users to visit fake sites.
Redirect Internet traffic to fake
Domain name spoofing
server (web site)

4. List three anti-malware.

Anti-virus Anti-adware Anti-spyware

C. Short questions:

1. State the purpose of pharming and phishing. (8 marks)


To gain users’ personal information without their permission.
_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

2. Explain why CAPTCHA tests work. (8 marks)

Characters cannot be read or interpreted by an automated computer


_____________________________________________________________________________________
program.
_____________________________________________________________________________________
_____________________________________________________________________________________

3. Viruses are a risk to data stored on computers. Installing anti-virus software can reduce the risk.
(i) Explain how anti-virus software works. (5 marks)

Any one explanation from:


• Compare files coming into the computer (1) against known virus codes
(signatures) / database of virus files (1)
• Monitors programs for suspicious behaviour (1) quarantines / flags as
dangerous (1)
• Scans computer / media for malicious files (1) alerts user if issues
identified (1)

(ii) Identify two other ways of reducing the spread of viruses. (10 marks)

Any two from


• Don’t download from unreliable / untrustworthy sites (1)
• Don’t click on links in emails unless you trust the sender (1)
• Don’t open email attachments unless you trust the sender (1)
• Enable browser security / site blocking options (1)
• Don’t use portable storage devices from unreliable sources (1)
• Don't give users admin privileges / ability to install software (1)
• Install / use a hardware firewall (1)

4. David has a username and password for his account. When he logs in he is also prompted to enter some
of his ‘memorable information’. (10 marks)

Give two ways in which this increases the security of the account.

Any two from:


• Extra step in login process (1)
• Need to know memorable information as well as the password (1)
• Makes it harder to guess/see (1)
• Reduces the possibility of automated attacks (1)

You might also like