Computer MCQs Chapter#6 Computer Security

 

            Chapter#6

                                          Computer Security


Sure, here are 20 multiple-choice questions (MCQs) on Chapter 6 - Computer Security for a 9th-grade level. Each question is followed by four options (A, B, C, D), and the correct answer is indicated in brackets.

  1. 1:What is the primary goal of computer security? A. Enhancing computer speed B. Protecting computer hardware C. Ensuring data confidentiality and integrity D. Maximizing software compatibility (C) Ensuring data confidentiality and integrity


  2. 2:Which of the following is a common method of unauthorized access to a computer system? A. Encryption B. Firewall C. Hacking D. Antivirus (C) Hacking


  3. 3:What is the purpose of a firewall in computer security? A. Virus removal B. Unauthorized access prevention C. Data encryption D. Software updates (B) Unauthorized access prevention


  4. 4:What is the term for a malicious software that spreads by attaching itself to other programs? A. Spyware B. Worm C. Trojan horse D. Adware (B) Worm


  5. 5:Which of the following is an example of a strong password? A. "password123" B. "abc123" C. "P@ssw0rd" D. "qwerty" (C) "P@ssw0rd"


  6. 6:What does HTTPS stand for in the context of web security? A. HyperText Transfer Protocol Secure B. HyperText Transfer Protocol Standard C. HyperText Transfer System D. HyperText Transport Security (A) HyperText Transfer Protocol Secure


  7. 7:What is the purpose of antivirus software? A. To enhance computer speed B. To prevent unauthorized access C. To detect and remove malicious software D. To encrypt data (C) To detect and remove malicious software


  8. 8:Which of the following is a physical security measure for computers? A. Firewall B. Biometric authentication C. Encryption D. Security patches (B) Biometric authentication


  9. 9:What does the term "phishing" refer to in computer security? A. Sending spam emails B. Stealing sensitive information through deceptive emails C. Installing malware D. Network intrusion (B) Stealing sensitive information through deceptive emails


  10. 10:What is the purpose of a backup in computer security? A. Enhancing computer speed B. Recovering data in case of loss or damage C. Preventing unauthorized access D. Encrypting files (B) Recovering data in case of loss or damage


  11. 11:What is the primary function of a biometric authentication system? A. Encrypting data B. Identifying users based on unique physical or behavioral traits C. Detecting malware D. Blocking malicious websites (B) Identifying users based on unique physical or behavioral traits


  12. 12:Which of the following is a secure way to connect to a Wi-Fi network? A. Using an open network without a password B. Using WEP encryption C. Using WPA3 encryption with a strong password D. Disabling all encryption (C) Using WPA3 encryption with a strong password


  13. 13:What is the purpose of a VPN (Virtual Private Network) in computer security? A. Enhancing computer speed B. Providing a secure and private connection over the internet C. Detecting and removing viruses D. Blocking spam emails (B) Providing a secure and private connection over the internet


  14. 14:Which of the following is an example of two-factor authentication? A. Username and password B. Fingerprint and retina scan C. Security question and answer D. CAPTCHA (B) Fingerprint and retina scan


  15. 15:What is the role of a CAPTCHA in computer security? A. Encrypting data B. Preventing malware attacks C. Identifying users based on physical traits D. Differentiating between humans and automated bots (D) Differentiating between humans and automated bots


  16. 16:What does the term "malware" stand for? A. Malicious software B. Master file C. Memory allocation error D. Multimedia archive (A) Malicious software


  17. 17:How can a user protect their computer from social engineering attacks? A. Regularly updating antivirus software B. Using strong passwords C. Being cautious about sharing personal information online D. Encrypting files (C) Being cautious about sharing personal information online


  18. 18:What is the purpose of regularly updating software and operating systems? A. Enhancing computer speed B. Improving user interface C. Patching security vulnerabilities D. Increasing storage capacity (C) Patching security vulnerabilities


  19. 19:What is the term for the practice of disguising one's identity online? A. Encryption B. Anonymity C. Authentication D. Biometrics (B) Anonymity


  20. 20:What is the first line of defense against unauthorized access to a computer system?

  21. A. Antivirus software B. Firewall C. Strong password D. Biometric authentication (C) Strong password

No comments: