Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

TLE ICT – Computer Systems Servicing

THIRD QUARTER
SUMMATIVE TEST # 1

Multiple Choice: Read the questions carefully. Choose the letter of the correct answer.
1. What type of security attack does when an employee intends to cause damage?
A. Accidental threats B. Unstructured Attack C. Malicious Threats D. Structured
2. This can help to prevent attackers from monitoring or recording traffic between resources and computers.
A. Anti-Virus B. Wi-Fi C. Data Security D. Data Encryption
3. This was the first-generation security standard for wireless networks.
A. LEAP B. WEP C. WTLS D. WPA
4. To recognize a phishing link inside an email mostly likely it contains the following except for one:
A. Asking for your credit details C. spelling and grammatical errors
B. Request for personal information D. domain name and email inconsistencies
5. What type of security threat that steal, damage, or destroy such equipment as servers, switches, and wiring.
A. Accidental threats B. Unstructured Attack C. Malicious Threats D. Physical
6. This is created with malicious intent that is attached to small pieces of computer code, software, or document.
A. Worm B. Virus C. Trojan Horse D. Spyware
7. This type of virus is common in Microsoft office applications.
A. Boot Sector Virus B. Program Virus C. Script Virus D. Macro Virus
8. This software is designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer.
A. Anti-Virus B. Network Security C. Data Security D. Data Encryption
9. This a way of protecting a computer from intrusion through the ports.
A. Anti-Virus B. Network Security C. Data Security D. Firewall
10. This wireless network standard was approved in February 2021 with a maximum data transfer rate of 1,201 Mbps.
A. 802.11a B. 802.11b C. WIFI 6 D. WIFI 4
11. An improved version of WEP. It was created as a temporary solution until 802.11i.
A. WEP128 B. WEP C. WEP64 D. WPA
12. This is a malware that self-replicates that is harmful to networks.
A. Worm B. Virus C. Trojan Horse D. Spyware
13. Software that appears to do one thing, and yet behind the scenes it does another.
A. Worm B. Virus C. Trojan Horse D. Spyware
14. 802.11a wireless standard operates at 5Ghz frequency giving you a maximum of how Mbps of data transfer rate?
A. 11Mbps B. 54Mbps C. 120Mbps D. 60Mbps
15. The process of monitoring, reporting, and training of user would commonly be done by this team of individuals.
A. DRR Team B. Anti-Piracy Team C. Security Awareness Team D. IT Department
16. This is a security layer used in mobile devices that employ the Wireless Applications Protocol.
A. WEP128 B. WTLS C. WEP64 D. WPA
17. This wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
A. WEP128 B. WEP C. WEP64 D. LEAP
18. A type of external attack which use available resources, such as passwords or scripts, to gain access to and run
programs designed to vandalize.
A. Accidental threats B. Unstructured Attack C. Malicious Threats D. Structured
19. A virus can be transferred to a computer in many ways, except for this one:
A. Email B. file transfer C. WIFI connection D. instant messaging
20. In windows operating system we use this feature in encrypting our stored data.
A. BitLocker drive encryption B. database encryption C. Data Encryption Standard D. Advanced Encryption Standard

You might also like