0% found this document useful (0 votes)
9 views

Grade8_Worksheet2 (1)

The document is a revision worksheet for a Grade 8 Computer Science final examination, covering topics such as malware, network security, and data protection. It includes multiple-choice questions, true or false statements, and short answer questions, along with an answer key. The content emphasizes the importance of cybersecurity measures like encryption, antivirus software, and firewalls.

Uploaded by

eyadsat2012
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Grade8_Worksheet2 (1)

The document is a revision worksheet for a Grade 8 Computer Science final examination, covering topics such as malware, network security, and data protection. It includes multiple-choice questions, true or false statements, and short answer questions, along with an answer key. The content emphasizes the importance of cybersecurity measures like encryption, antivirus software, and firewalls.

Uploaded by

eyadsat2012
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Final Examination – Term 2 (2024-25)

Subject: Computer Science (Revision Worksheet2) grade:8


Section A:Multiple Choice Questions

1. Which of the following is a common way for malware to spread?


a) Email attachments
b) Strong passwords
c) Firewalls
d) Encryption

2. What type of malware is often disguised as a legitimate program and can give hackers
control of your computer?
a) Worm
b) Trojan Horse
c) Virus
d) Adware

3. Which of the following is an example of a software vulnerability that attackers often


target?
a) Hardware firewalls
b) Unpatched software
c) Strong encryption
d) Regular backups

4. What is the primary purpose of a backup?


a) To prevent data theft
b) To restore lost data
c) To speed up internet connections
d) To prevent malware from spreading

5. Which of the following best describes the concept of "social engineering"?


a) A type of malware
b) A method of hacking into networks
c) Manipulating people into revealing confidential information
d) A type of physical security measure

6. Which of the following is a common method of protecting a network from unauthorized


access?
a) Virus scanning
b) Using a VPN
c) Phishing
d) Data backups

7. Which of these is a type of attack that involves overwhelming a server with traffic to
cause it to crash?
a) DDoS
b) Man-in-the-middle
c) Phishing
d) Social engineering

8. What does the term 'two-factor authentication' mean?


a) A password is required to access the account
b) The user must authenticate in two different ways, e.g., password and phone verification
c) Only one device can authenticate the user
d) The user needs to change passwords every two weeks

9. Which of the following is an example of physical security?


a) Installing an antivirus
b) Using a strong password
c) Locking the computer in a secure room
d) Encrypting data

10. Which of these can be a consequence of not securing sensitive data?


a) Increased customer trust
b) Legal penalties
c) Improved software performance
d) Reduced network traffic

Section B: True or False

1. Ransomware encrypts files on a computer, and the attacker demands payment to


decrypt them.

2. A strong password is one that contains only letters and numbers.

3. A VPN (Virtual Private Network) helps to anonymize your online activities by routing
your traffic through a private server.

4. Antivirus software is not necessary if you use a strong firewall.

5. Two-factor authentication requires the user to provide something they know (like a
password) and something they have (like a mobile device).
6. A firewall can monitor and block unauthorized access to a computer network.

7. Encryption is not necessary if you use a secure network connection.

8. Social engineering attacks rely on technical vulnerabilities in a system.

9. Ransomware encrypts data and demands payment to decrypt it.

10. Using complex passwords with a mix of letters, numbers, and symbols makes it harder
for attackers to guess them.

Section C: Short Answer Questions

1. Explain the role of encryption in protecting sensitive data.

2. What are the key differences between a virus and a worm?

3. Why is it important to regularly update your software and operating system?

4. What is the role of antivirus software in computer security?

5. Explain the concept of "phishing" and how individuals can protect themselves from it.

6. Why is it important to use a firewall on a network?


7. Describe what a "Trojan Horse" is and give an example of how it can affect a system.

Answer Key for Worksheet 2

Section A: Multiple Choice Questions

1. a) Email attachments

2. b) Trojan Horse

3. b) Unpatched software

4. b) To restore lost data

5. c) Manipulating people into revealing confidential information

6. b) Using a VPN

7. a) DDoS

8. b) The user must authenticate in two different ways, e.g., password and phone verification

9. c) Locking the computer in a secure room

10. b) Legal penalties

Section B: True or False

1. True

2. False (A strong password should include letters, numbers, and special characters.)

3. True

4. False (Antivirus software is still important to prevent malware infections.)

5. True

6. True

7. False (Encryption is necessary even on secure connections to protect data in case of


interception.)

8. False (Social engineering relies on manipulating people, not system vulnerabilities.)

9. True
10. True

Section C: Short Answer Questions

1. Encryption protects sensitive data by converting it into unreadable format using a key,
ensuring that even if intercepted, unauthorized parties cannot read it.

2. A virus requires a host file to spread and typically damages files, while a worm is self-
replicating and spreads independently across networks.

3. Regular updates patch vulnerabilities and improve security. Outdated software can have
security flaws that are commonly exploited by cybercriminals.

4. Antivirus software detects and removes malware (viruses, worms, etc.) from a computer,
helping to protect the system from malicious threats.

5. Phishing is a method of tricking people into revealing sensitive information by


impersonating legitimate organizations. Individuals can protect themselves by being
cautious of suspicious emails, verifying the sender’s email, and avoiding clicking on
suspicious links.

6. A firewall controls the incoming and outgoing traffic on a network, preventing unauthorized
access to the system and blocking malicious activities.

7. A Trojan Horse is a type of malware that disguises itself as a legitimate program to trick
users into installing it. Once installed, it can steal data, provide remote access to hackers,
or cause other types of damage.

You might also like