You are on page 1of 6

ICDL / ECDL 2.

0 IT Security Diag Eng

European Computer Driving Licence, ECDL, International Computer Driving Licence, ICDL, e-Citizen and related
logos are all trademarks of The European Computer Driving Licence Foundation Limited (ECDL Foundation).

The Diagnostic Assessment ICDL / ECDL 2.0 IT Security Diag Eng has been developed by PSI and has been
approved by ECDL Foundation for use by candidates preparing to sit the corresponding Certification Test.

This is not a test, candidates will not receive a certificate or results when availing of this product.

The test is complete

Your score

Total result 0%

Result by Category
Security Concepts 0%
Malware 0%
Network Security 0%
Access Control 0%
Secure Web Use 0%
Communications 0%
Secure Data Management 0%

Answer Listing
Item Text Answer Feedback Result

Security Concepts

Which one of the following Your Answer Correct Answer Unanswered


best describes the Unanswered Data is the raw input that information is
relationship between data based on.
and information?
Which one of the following Your Answer Correct Answer Unanswered
best describes cybercrime? Unanswered Illegal activities by means of computer
networks.

Which one of the following Your Answer Correct Answer Unanswered


is NOT a possible threat to Unanswered Screen resolution.
data?
Which one of the following Your Answer Correct Answer Unanswered
is an example of a threat to Unanswered Fire.
data from extraordinary
circumstances?
Which one of the following Your Answer Correct Answer Unanswered
is a typical threat to data Unanswered Loss of privacy.
from using cloud
computing?
..................... is a characteristic Your Answer Correct Answer Unanswered
of information security that Unanswered Confidentiality.
ensures the nondisclosure
of data except to another
authorised person.
Which one of the following Your Answer Correct Answer Unanswered
best describes why you Unanswered To reduce the risk of identity theft.
should protect your
personal information?
Which one of the following Your Answer Correct Answer Unanswered
best describes the reason Unanswered To prevent theft of financial details.
for protecting commercially
sensitive information?
Which one of the following Your Answer Correct Answer Unanswered
is a main principle of data Unanswered To protect personal data.
protection legislation?
Which one of the following Your Answer Correct Answer Unanswered
best describes a data Unanswered An individual who provides their personal
subject? data to a data controller.
Which one of the following Your Answer Correct Answer Unanswered
best describes how ICT Unanswered To provide employees with a set of rules that
guidelines are used in an defines general computer use.
organisation?
Which one of the following Your Answer Correct Answer Unanswered
best describes the purpose Unanswered Information gathering.
of social engineering?
Which one of the following Your Answer Correct Answer Unanswered
is a method of social Unanswered Sending e-mail that falsely claims to be from
engineering? a legitimate source.

Which one of the following Your Answer Correct Answer Unanswered


best describes a direct Unanswered Your e-mail account may be accessed by
consequence of identity someone else.
theft?
Which one of the following Your Answer Correct Answer Unanswered
is a method of identity Unanswered Skimming.
theft?
Which one of the following Your Answer Correct Answer Unanswered
best describes the effect of Unanswered Your computer will be more at risk from
enabling an application to viruses.
run macros?
Which one of the following Your Answer Correct Answer Unanswered
is a disadvantage of data Unanswered The strength of the encryption is decreased
encryption? if the key has few characters.
Where would you click in Your Answer Correct Answer Unanswered
the image to encrypt the Unanswered The Advanced button
files folder?
Open the file named Suggested solution: Choose the Open command. When the document is Unanswered
Internet.doc from \. Apply opened, choose the Save As command. Word 2003: In the Save As window,
the password network to click the Tools button (located top right) and choose Security Options.... In
open the document and the Security window, enter the password network to open the file. Click OK.
then save the Internet file. If In the Confirm Password window, re-enter the password and click OK. In the
a question is shown asking Save As window, click the Save button. Word 2007 and 2010: In the Save As
to convert to an Office XML window, click the Tools button (located next to the Save button) and choose
format, click No. General Options.... In the General Options window, enter the password
network to open the file. Click OK. In the Confirm Password window, re-enter
the password and click OK. In the Save As window, click the Save button.

Malware

Which one of the following Your Answer Correct Answer Unanswered


best describes what can be Unanswered A trojan.
used to conceal malware on
a computer?
Which one of the following Your Answer Correct Answer Unanswered
best describes malware? Unanswered Software that is designed to harm a
computer system.

Which one of the following Your Answer Correct Answer Unanswered


is a characteristic of a virus? Unanswered A computer virus can spread from a
seemingly normal file.

Which one of the following Your Answer Correct Answer Unanswered


is NOT a characteristic of Unanswered It is impossible to remove from a computer.
adware?
Which one of the following Your Answer Correct Answer Unanswered
is a characteristic of anti- Unanswered It scans the computer for malware.
virus software?
Which one of the following Your Answer Correct Answer Unanswered
does NOT need to have Unanswered A scanner.
anti-virus software
installed?
Which one of the following Your Answer Correct Answer Unanswered
best describes why anti- Unanswered To protect against new computer viruses.
virus software should be
updated regularly?
Which one of the following Your Answer Correct Answer Unanswered
increases the risk of Unanswered Using obsolete and unsupported software.
contracting malware the
most?
Which one of the following Your Answer Correct Answer Unanswered
best describes the Unanswered Infected files that cannot be deleted nor
quarantine in anti-virus cleaned during scanning of files are placed
software? here.
You suspect your hard drive Your Answer Correct Answer Unanswered
have been subject to a Unanswered Visit the website of a well-known anti-virus
malware attack. Which one company.
of the following is the best
course of action in order to
diagnose and identify the
threat?

Network Security

Which one of the following Your Answer Correct Answer Unanswered


is a security implication Unanswered Your private information may be at risk.
when connecting to a
network?
Which one of the following Your Answer Correct Answer Unanswered
is most likely to manage Unanswered The network administrator.
the authentication,
authorisation and
accounting within a
computer network?
Which one of the following Your Answer Correct Answer Unanswered
best describes the function Unanswered A firewall blocks unauthorised access from
of a firewall? outside a network.
You have installed a Your Answer Correct Answer Unanswered
program which needs Unanswered Allow the program access through the
internet access. The firewall.
software can be started but
does not seem to connect
to the internet. Which one
of the following actions is
most likely needed to solve
the problem?
Which one of the following Your Answer Correct Answer Unanswered
is known by the term WEP? Unanswered Wired Equivalent Privacy.
Which one of the following Your Answer Correct Answer Unanswered
should you be aware of Unanswered Your data will be accessible to outsiders.
when using an unprotected
wireless network?
Which one of the following Your Answer Correct Answer Unanswered
allows a device to connect Unanswered A personal hotspot.
to the Internet using
another mobile devices
data connection?

Access Control

Which one of the following Your Answer Correct Answer Unanswered


prevents unauthorised Unanswered Using a strong password.
users from accessing data?
Which one of the following Your Answer Correct Answer Unanswered
best describes a one-time Unanswered A password that is valid for only one login
password? session.
Which one of the following Your Answer Correct Answer Unanswered
best describes the purpose Unanswered To provide users with services like file
of a company network sharing, e-mail and Internet access.
account?
From a security perspective, Your Answer Correct Answer Unanswered
which one of the following Unanswered Make sure to log off.
actions is most important
before leaving a computer
logged on to a network?
Which one of the following Your Answer Correct Answer Unanswered
is a common biometric Unanswered Fingerprint.
security technique used in
access control?
Which one of the following Your Answer Correct Answer Unanswered
passwords is an example of Unanswered jaCkbRown_23-11-1990!
good practice?
Which one of the following Your Answer Correct Answer Unanswered
applications has the Unanswered Password manager.
functionality of storing
multiple usernames and
passwords in one location?
Secure Web Use

Which one of the following Your Answer Correct Answer Unanswered


best describes when the Unanswered When entering your credit card information.
auto complete function
should be disabled when
completing an online form?
Which one of the following Your Answer Correct Answer Unanswered
applications would you use Unanswered Internet Explorer.
to delete browsing history?
Which one of the following Your Answer Correct Answer Unanswered
is an online activity that Unanswered Purchasing a gift.
should only be undertaken
on a secure web page?
Which part of Your Answer Correct Answer Unanswered
https://www.security.org Unanswered https
indicates that it is a secure
website?
Which one of the following Your Answer Correct Answer Unanswered
best describes the term Unanswered Deliberately misdirecting users to a
pharming? fraudulent website.

Which one of the following Your Answer Correct Answer Unanswered


best describes parental Unanswered It restricts access to chat, file sharing or web
control software? browsing.

Communications

Which one of the following Your Answer Correct Answer Unanswered


best describes the purpose Unanswered It makes encrypted e-mail readable.
of decrypting e-mail?
Which one of the following Your Answer Correct Answer Unanswered
is an example of how a Unanswered To improve e-mail security.
digital signature might be
used?
Which one of the following Your Answer Correct Answer Unanswered
best describes phishing? Unanswered E-mail with the intent to trick the recipient
into revealing financial details.

Which one of the following Your Answer Correct Answer Unanswered


should be reported to the Unanswered Phishing attempt.
national fraud and cyber
crime agency?
Which one of the following Your Answer Correct Answer Unanswered
actions is most likely to Unanswered Opening an e-mail attachment from an
spread malware? unknown sender.
Which one of the following Your Answer Correct Answer Unanswered
best describes why you Unanswered The information may be used by other users
should NOT disclose for identity theft.
personal confidential
information on social
networking sites?
Which one of the following Your Answer Correct Answer Unanswered
does NOT ensure that data Unanswered Moving data to the recycle bin
is permanently destroyed?
Which one of the following Your Answer Correct Answer Unanswered
is a potential danger when Unanswered Grooming.
using social networking
sites?
Which one of the following Your Answer Correct Answer Unanswered
best describes a known Unanswered Message attachments can contain malware.
security vulnerability of
instant messaging (IM)?
Which one of the following Your Answer Correct Answer Unanswered
helps ensure confidentiality Unanswered Not revealing personal information.
when using instant
messaging?

Secure Data Management

Which one of the following Your Answer Correct Answer Unanswered


can be used to reduce the Unanswered Cable lock.
risk of computer theft?
Which one of the following Your Answer Correct Answer Unanswered
should be carried out to Unanswered Backups.
prevent loss of data?
Which one of the following Your Answer Correct Answer Unanswered
is an important part of a Unanswered Store the files in a different location.
back-up procedure?
Make a backup copy of the Suggested solution: Choose the Save As command. In the Save As window, Unanswered
file Budget.xls by saving it open the December Backup folder and click Save.
to the folder December
backup in \.
Which one of the following Your Answer Correct Answer Unanswered
is an important reason for Unanswered It makes the data completely inaccessible.
permanently deleting data
from a device?
Which one of the following Your Answer Correct Answer Unanswered
is a method to ensure data Unanswered Make sure the storage media is physically
is permanently destroyed? destroyed.

You might also like