Welcome To Www.ExamWeapon.Com


Click On Our Answer Page Below And Enter The Pin: "PIN 5555"



home
Home
home
JAMB
home
WAEC
home
NECO
home
NABTEB


Jss2 second Term security education past questions and answers

Jss2 second Term security education past questions and answers

Security education questions with options and answers:

Question: What is a keylogger in the context of cybersecurity?

a) A tool for managing encryption keys
b) Software that records keystrokes
c) A device used for physical security
d) A mechanism to create secure passwords

Answer: b) Software that records keystrokes

Question: Why is it important to review app permissions on mobile devices?

a) To save battery life
b) To block incoming calls
c) To control access to personal information
d) To organize app icons

Answer: c) To control access to personal information

Question: What is the purpose of a biometric authentication system?

a) To organize fingerprints
b) To secure email communication
c) To verify identity using unique physical or behavioral characteristics
d) To increase internet speed

Answer: c) To verify identity using unique physical or behavioral characteristics

Question: How can you identify a secure website when browsing online?

a) By checking for spelling mistakes in the URL
b) If it has a padlock symbol in the address bar
c) Based on the website's color scheme
d) By the number of pop-up ads

Answer: b) If it has a padlock symbol in the address bar

Question: What is the primary purpose of a security audit?

a) To organize network cables
b) To assess and improve the effectiveness of security measures
c) To increase internet speed
d) To update software licenses

Answer: b) To assess and improve the effectiveness of security measures

Question: How does a brute-force attack work in the context of password security?

a) By guessing passwords through trial and error
b) By encrypting files
c) By creating strong passwords automatically
d) By using facial recognition

Answer: a) By guessing passwords through trial and error

Question: What is the role of a security policy in an organization?

a) To organize office furniture
b) To guide employees on acceptable security practices
c) To improve internet speed
d) To create a backup of files

Answer: b) To guide employees on acceptable security practices

Question: Why is it important to shred sensitive documents before disposal?

a) To save storage space
b) To organize files efficiently
c) To prevent unauthorized access to confidential information
d) To improve printer performance

Answer: c) To prevent unauthorized access to confidential information

Question: What is the purpose of a security token in authentication?

a) To organize digital files
b) To create secure passwords
c) To generate one-time codes for authentication
d) To increase internet speed

Answer: c) To generate one-time codes for authentication

Question: How does a VPN contribute to online privacy?

a) By blocking all internet traffic
b) By creating a virtual private network to encrypt internet connections
c) By organizing digital certificates
d) By improving browser speed

Answer: b) By creating a virtual private network to encrypt internet connections

Question: What is the purpose of a security awareness training program for employees?

a) To teach programming languages
b) To raise awareness about potential security risks and best practices
c) To organize network cables
d) To create secure email accounts

Answer: b) To raise awareness about potential security risks and best practices

Question: Why should you avoid using public computers for sensitive transactions?

a) To improve computer performance
b) To protect personal information from unauthorized access
c) To organize files efficiently
d) To increase internet speed

Answer: b) To protect personal information from unauthorized access

Question: What is the purpose of role-based access control (RBAC) in network security?

a) To organize server rooms
b) To create secure passwords
c) To restrict access based on job responsibilities
d) To improve internet speed

Answer: c) To restrict access based on job responsibilities

Question: How does a firewall contribute to network security?

a) By organizing digital files
b) By blocking unauthorized access and controlling incoming/outgoing traffic
c) By increasing internet speed
d) By encrypting email communication

Answer: b) By blocking unauthorized access and controlling incoming/outgoing traffic

Question: What is the purpose of an incident response plan in cybersecurity?

a) To organize office supplies
b) To guide actions and responses in the event of a security incident
c) To create secure passwords
d) To improve internet speed

Answer: b) To guide actions and responses in the event of a security incident

Question: Why is it important to have a secure Wi-Fi password for home networks?

a) To organize digital devices
b) To prevent unauthorized access and protect network traffic
c) To increase internet speed
d) To organize browser bookmarks

Answer: b) To prevent unauthorized access and protect network traffic

Question: What is the role of encryption in email security?

a) To organize email folders
b) To increase internet speed
c) To protect email content by encoding it
d) To create secure email accounts

Answer: c) To protect email content by encoding it

Question: How can physical security measures be applied to protect a computer?

a) By using a strong antivirus program
b) By organizing digital files
c) By implementing locks and access control for the physical computer
d) By increasing internet speed

Answer: c) By implementing locks and access control for the physical computer

Question: What is the purpose of a security risk assessment?

a) To organize server rooms
b) To identify and evaluate potential security risks and vulnerabilities
c) To create secure passwords
d) To improve internet speed

Answer: b) To identify and evaluate potential security risks and vulnerabilities

Question: How does a secure socket layer (SSL) certificate contribute to website security?

a) By organizing website content
b) By encrypting data transmitted between the user's browser and the website
c) By creating strong passwords for users
d) By improving internet speed

Answer: b) By encrypting data transmitted between the user's browser and the website

0 Comments

Post a Comment

Post a Comment (0)

Previous Post Next Post