Welcome To Www.ExamWeapon.Com


Click On Our Answer Page Below And Enter The Pin: "PIN 5555"



home
Home
home
JAMB
home
WAEC
home
NECO
home
NABTEB


Jss3 first term education security past questions and answers

Jss3 first term education security past questions and answers

Question: What is the primary purpose of a firewall in computer security?

a) Virus removal
b) Network monitoring
c) Unauthorized access prevention
Answer: c) Unauthorized access prevention

Question: Which type of malware is designed to spread from one computer to another without the user's knowledge?

a) Spyware
b) Worm
c) Trojan
Answer: b) Worm

Question: What is the purpose of encryption in data security?

a) Data compression
b) Data authentication
c) Data confidentiality
Answer: c) Data confidentiality

Question: Which of the following is a common method to create strong passwords?

a) Using birthdays
b) Using dictionary words
c) Combining letters, numbers, and symbols
Answer: c) Combining letters, numbers, and symbols

Question: What is phishing?

a) A fishing technique
b) A method of catching malware
c) A fraudulent attempt to obtain sensitive information
Answer: c) A fraudulent attempt to obtain sensitive information

Question: What does the acronym VPN stand for?

a) Virtual Private Network
b) Very Private Network
c) Visual Private Network
Answer: a) Virtual Private Network

Question: In computer security, what does the term "Biometrics" refer to?

a) Biological weapons
b) Authentication based on unique physical or behavioral attributes
c) Binary metrics
Answer: b) Authentication based on unique physical or behavioral attributes

Question: What is a keylogger?

a) A device for typing faster
b) Software that records keystrokes
c) A hardware component of a computer
Answer: b) Software that records keystrokes

Question: What is a DMZ (Demilitarized Zone) in network security?

a) A dangerous zone on the internet
b) A buffer zone between a private network and the internet
c) A secure zone for confidential data
Answer: b) A buffer zone between a private network and the internet

Question: What is two-factor authentication?

a) Using two different passwords
b) An authentication method using two verification steps
c) Authentication based on biometrics
Answer: b) An authentication method using two verification steps

Question: Which protocol is commonly used to secure communication over the internet?

a) HTTP
b) FTP
c) HTTPS
Answer: c) HTTPS

Question: What is the role of antivirus software?

a) Enhancing computer speed
b) Protecting against malware and viruses
c) Managing computer memory
Answer: b) Protecting against malware and viruses

Question: What is the purpose of a security patch?

a) Enhancing software features
b) Fixing vulnerabilities and improving security
c) Adding new functionalities
Answer: b) Fixing vulnerabilities and improving security

Question: What is the difference between a virus and a trojan?

a) Viruses spread independently, while trojans rely on user actions
b) Trojans are more harmful than viruses
c) Viruses only affect hardware
Answer: a) Viruses spread independently, while trojans rely on user actions

Question: What does the principle of least privilege mean in security?

a) Providing maximum access to all users
b) Granting minimal access required for tasks
c) Giving access based on seniority
Answer: b) Granting minimal access required for tasks

Question: What is a CAPTCHA used for?

a) Encrypting emails
b) Identifying spam
c) Verifying that a user is human
Answer: c) Verifying that a user is human

Question: What is social engineering in the context of security?

a) Improving social skills for better teamwork
b) Manipulating people into divulging confidential information
c) Upgrading social media accounts
Answer: b) Manipulating people into divulging confidential information

Question: Why is it important to keep software up to date for security?

a) To improve the user interface
b) To fix bugs and vulnerabilities
c) To add new features
Answer: b) To fix bugs and vulnerabilities

Question: What is a honeypot in cybersecurity?

a) A trap set to detect, deflect, or study attempts at unauthorized use
b) A device for collecting honey
c) A type of firewall
Answer: a) A trap set to detect, deflect, or study attempts at unauthorized use

Question: What does the acronym DDoS stand for?

a) Distributed Data System
b) Dedicated Denial of Service
c) Dynamic Detection of Security
Answer: b) Dedicated Denial of Service

0 Comments

Post a Comment

Post a Comment (0)

Previous Post Next Post