Information Security Solved MCQs

New mcq
What should you look out for when reading emails
icon 1 answers
icon43 Views
icon0 Likes
Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
icon 1 answers
icon42 Views
icon0 Likes
What should a strong password include?
icon 1 answers
icon44 Views
icon0 Likes
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
icon 1 answers
icon42 Views
icon0 Likes
______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks
icon 1 answers
icon37 Views
icon0 Likes
If a website is using HTTPS it means that
icon 1 answers
icon41 Views
icon0 Likes
What do we use a SPAM filter for?
icon 1 answers
icon47 Views
icon0 Likes
Qwerty123 is a Strong Password (i.e. not a cyber security risk)
icon 1 answers
icon44 Views
icon0 Likes
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
icon 1 answers
icon35 Views
icon0 Likes