Académique Documents
Professionnel Documents
Culture Documents
Sample Part-Test
Understand communication security issues that can arise from using email, social networks, voice over Internet protocol, instant messaging
and mobile devices.
Back up and restore data to local and cloud storage locations and
delete and dispose of data and devices securely.
Page 1 of 9
Sample Part-Test 1
This is a sample part-test.
The following is the sample part-test for ECDL / ICDL IT Security. This test
consists of 18 questions with 1 mark available for each question. The total
marks available are 18 marks.
1
a.
b.
c.
d.
4
[1 mark]
[1 mark]
[1 mark]
Phishing.
Eavesdropping.
Pretexting.
Skimming.
Which one of the following best describes malware?
[1 mark]
computer system.
b. Software that is used to infiltrate a computer system without
Page 2 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
a.
b.
c.
d.
[1 mark]
Continued
Option a.
Option b.
Option c.
Option d.
Page 3 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
[1 mark]
Degaussing.
Firewalls.
Phishing.
Cookies.
Which one of the following best describes the term personal
hotspot?
Keystroke logging.
Social engineering.
Face recognition.
Cable locks.
Which one of the following passwords is an example of
good practice?
a.
b.
c.
d.
[1 mark]
[1 mark]
[1 mark]
Continued
12061985
password1.
w1g_w@ms.
access.
Page 4 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
a.
b.
c.
d.
Content quality.
Currency.
Security certificate.
Valid URL.
Page 5 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
[1 mark]
Continued
12
Adware.
Spyware.
Phishing software.
Content control software.
Where would you click in the image below if you want to edit
options for the account privacy of your posts?
a.
b.
c.
d.
[1 mark]
[1 mark]
Continued
Option a.
Option b.
Option c.
Option d.
Page 6 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
14
Keystroke logging.
Application backup.
Data destruction utilities.
Application permissions.
Which one of the following will help with data recovery in the
event of data loss from a computer?
a.
b.
c.
d.
15
[1 mark]
a.
b.
c.
d.
[1 mark]
[1 mark]
Continued
Option a.
Option b.
Option c.
Option d.
Page 7 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
a.
b.
c.
d.
[1 mark]
Continued
Option a.
Option b.
Option c.
Option d.
Page 8 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
18
[1 mark]
Page 9 of 9
Ref: ECDL / ICDL IT Security - Syllabus - V2.0 - Sample Part-Test - MSWIN7IE10 - V1 - 0
2015 ECDL Foundation
SAMPLE TEST - NOT FOR REDISTRIBUTION
[1 mark]