Preventing Unauthorised Access

Is this your test? Login to manage it. If not, you can develop an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Biometric methods use which of the following to access computer systems?
2.
1 point
Which of the following best describes spyware?
3.
1 point
To prevent hacking, which one of the following software should one use?
4.
1 point
How many types of levels of Access are there?
5.
1 point
Internet fraud is
6.
1 point
Most online systems and computer systems are secure by which one of the following?
7.
1 point
Firewall is a piece of software that prevents which of the following?
8.
1 point
Which of the following best describes Identity theft?
9.
1 point
Which of the following is NOT one of the Levels of access?
10.
1 point
Which of the following best describes phishing?
11.
1 point
Which of the following should you look out for to spot a phishing email?
12.
1 point
Which of the following is a Firewall