EXAM TASK Przeczytaj trzy teksty dotyczące bezpieczeństwa systemów komputerowych. Z podanych odpowiedzi wybierz właściwą, zgodną z treścią tekstu. Zakreśl literę A, B albo C.
Tekst 1.
‘What time is it?’ Tom was getting a bit bored as the lesson continued. He reached for his mobile phone to check the time. As soon as he looked at the screen, he noticed the box at the top of the screen informing him that data transfer was in progress. ‘What is going on?!’ It took him a while to realise that someone had accessed his phone data via wi-fi. During the previous break he had exchanged some photos with Alex and had forgotten to switch it off. He quickly removed the battery and the phone went dead. Tom looked around at his classmates to see who had played the joke on him. There! Max was looking at him with a nasty smile on his face.
1 What did Tom notice first when he looked at his phone?
A The wireless system wasn’t working.
B Someone was copying data from his phone.
C There was something wrong with his phone battery.
Tekst 2.
During the course, you will learn about the most common techniques hackers use to break into Android and iOS. We will also discuss the important issues in mobile security and teach you how to protect your mobile phone from hacking attacks. There will also be some practical tasks. As part of the course, we will try to hack into a phone in order to understand the weaknesses of mobile systems, and, as a result, you will learn to protect yourself more effectively.
2 What is the best title for this text?
A Dangerous Hackers
B Mobile Data Safety
C Hacking Techniques
Tekst 3.
Hi,
I’ve read your blog entry about the different types of techniques that hackers use to access our Facebook accounts. I must say I found it rather scary! I didn’t realise that there were so many ways to do that. All this phishing, keylogging, session hijacking and so on made me wonder whether my Facebook account is safe. So, could you please write more about what I can do to protect it?
Thanks in advance for your help!
John
3 John wrote the comment mainly to
A thank the blog author for the information about hacking techniques.
B express his concern about the security of his Facebook account.
C ask the blog author for advice on Facebook security.