FINAL TEST

A vibrant illustration depicting cybersecurity concepts such as firewalls, malware, and internet safety, featuring diverse students engaging with technology in a digital environment.

Cybersecurity Awareness Quiz

Test your knowledge on cybersecurity and online safety with our engaging quiz designed for students and enthusiasts alike. This quiz consists of 30 carefully crafted questions that challenge your understanding of various cybersecurity concepts.

Key Features:

  • Multiple choice and checkbox questions
  • Immediate feedback on your answers
  • Enhance your knowledge of online security
100 Questions25 MinutesCreated by SecureStream312
Sally is a 16 -year-old high school student Who is extremely attached to her laptop. She uses it to and watch episodes of her favorite sitcom. While watching one of the episodes: her laptop switched off automatically a couple of times_ Suspecting a malware infection. She opened the antivirus software on her laptop and chose a technique, which examined all files on the memory and hard disk in order to identify and locate the malware. Which antivirus technique did Sally employ ?
Integrity checking
Bookmarks method
Heuristics analysis
Scanning
Security features help to prevent people from gaining access to information that you have not given them permission to access, such as credit card Information you enter when shopping on the Internet. Security feature can also protect your computer from unsafe software. Security feature in Internet Explorer (XP SP2) Select 4 answers
16-bjt secure connection for using secure Web Sites (SSL)
Enhanced security features to warn you when Web site is trying to download files or software to your -computer
The ability to block most pop-up Windows
Digital signatures, which verify that a file crone from the person or publisher it claims to be from, and that no one has tampered with It Since it digitally signed
The ability to updater disabler or re-enable Web browser add-ons
Which of the following what is SSH port?
990
22
21/22
25
A 'private' folder in Windows XP is
A folder that is not shared
A hidden folder
An encrypted folder
A privately shared folder
Susan_ a 15-year-old girl, loves spending her free time baking and cycling_ However: recently she has been spending all of her free time glued to the computer. She shows no interest in her hobbies anymore and looks depressed most of the time _ Her parents also noticed that whenever they enter her room, she quickly changes the computer screen_ Understandably: Susan's parents are worried about. What could be the reason for her behavior?
Unsolicited emails
Victim of online Child abuse
Too much pressure at school
Social engineering
A 'private' folder in Windows XP is
What are the three most common rise associated With "surfing the Web7V (Select 3 answers)
Theft of Credit card information
Theft of personal identity and other private information
Overloading computer stem resource
Contamination by a virus or Other malicious code
A newly established ITES company plans to launch a website which enables its users to share pictures and videos With each other. Apart from this: users can also comment on these pictures and share them further. Under which of the following cloud categories will the company-s product come?
Private Cloud
Hybrid Cloud
Community cloud
Public Cloud
Event viewer is used for
Viewing progress Of events
Viewing web events in real time
Viewing mail analysis of events
Viewing system log of events
Which of the following terms refers to malicious software that is specifically built to target mobile phone to software systems?
Broken cryptography
Phishing
Mobile malware
Unmanaged application
To restrict visiting Internet sites, you can modify the settings of your…………………
ISP
Modem
Operating System
Web Browser
Which of the following software programs runs on the internet and allows users to find, access, and display web pages?
Extensions
Web browsers
Search engine
Email
Choose the correct statement from the following
An antivirus is not needed when a firewall filters SII ports
A personal firewall protects systems from Internet attacks to a certain extent
An antivirus eliminates the need for a firewall
A personal firewall will check email attachments for malware
Which of the following fundamental concepts of security,' refers to an action taken in advance to protect the system against threats or dangers?
Precaution
Nonrepudiation
Maintenance
Reaction
When you login to your computer, you
Identify and authorize
Authenticate and reinforce
Identify and authenticate
Authenticate and validate
Certain software applications add or modify a particular feature in a browser. A few versions allow users to block ads: watch online videos: or IM with friends. What is this application called?
Cookies
Java
ActiveX
Extensions
Choose the correct statement
Security is only a One stage process
The skill level needed to conduct an exploit has decreased
Evolution of technology did little to increase ease Of use
Software flaws can be absolutely eliminated
Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the tactics they employ in the upcoming Champions League Final. The following day_ Alex received an email with the transcript of the conversation he had with Wayne. The sender of the email threatened to make Alex's tactics public, if he did not pay him $5000. Which form of mobile device attack was Alex a victim of?
Phishing
Social engineering
Man in the middle attack
Eavesdropping
What is a "cookies (Select 2 answers)
A cookie is a dynamic link library (dll) loaded when Windows starts
A cookie is a file created by an Internet site to store Information on your computer
A cookie is a file encryption utility
A cookie is a spyware program
This part of an email informs you about the address from where it came time of the message, date sent and the subject line. Identify the email part?
Header
Signature
Body
Foote
Tom, a 14-year-old boy has been chatting online with Adam, whom Tom assumes in 14 years old as well. Over the months, they build up a great ‘online’ friendship, playing online games, checking out EDEM websites, continuing with their friendly rivalry over football, and just taking about ‘guy’ stuff, When Adam invited Tom over to meet him, Tom was obviously excited. However, when Tom met Adam, he was shocked, as Adam turned out to be 35 years old man. Despite this shock, Tom entered Adam’s house, as he trusted him. Tom was having a great time playing PS3 with Adam, until the time Adam touched him inappropriately. Tom ran away from Adam’s house and did not know what to do. Which form of cyber-attack was Tom a victim of?
Social engineering
Phishing
Grooming
Pornography
Which privacy issue of clouds exposes users to the risk of their data being accessed by the cloud service provider without the user's consent?
Data migration
Data ownership
Data permanency
Data locationData location
How Would you activate SSL on your system?
Register With a security provider such as Verisign
There is no need to do anything to activate SSL
Download a SSL certificate from a secure server
Use the SSL extension in your LIRL (https)
Susan downloaded a software from the Internet and installed it on her computer for watching movies online. After installing the software, she noticed that her PC was slowing down and was taking more time to open webpages. What could Susan do to solve this problem?
Install a latest antivirus software and scan her computer
Stop using wireless internet connection
Start using Ethernet
Choose a suitable encryption method
Which of the following what is IMAP port?
110
143
88
445
Which of the following terms refers to a collection of information that defines or describes the user and his or her interests?
Profile
Facebook group
Time line
Account settings
What is an incident?
Misuse of computer resources by running malicious codes
Gain unauthorized access to computers
All of the above
An undesired event violating the security a computer
Raymond received an email from an official claiming to be from his bank The email requested Raymond to send his personal details since the customer database of the bank was being updated_ Up on confirmation from the bank_ Raymond was told that the bank had not sent any emails asking for the personal details of their customers. Which cyber-attack would Raymond have been a victim of if he had replied to the email?
Man in the middle attack
War driver
Phishing
Eavesdropping
SSID is the …………
Secure ID given to an individual browsing on a Wireless LAN
Encryption of data over radio Waves to avoid interception
Name of a wireless local area network
Application Of SSL in a wireless LAN
Isaac is transferring all the data from his computer to an external drive as he wants to format his laptop_ While moving the data. He accidentally hits delete instead of cut on one of the files and without realizing: hit the enter key when the computer prompted to confirm his action. As the file was a huge one it did not go to the recycle bin and got permanently deleted_ type of data loss is this?
Computer virus
Human error
Hardware theft
Software failure
Events are of two types namely………… and…………… events
Application and Security
Application and Execution
Execution and Security
Application and Log
What does a lock icon symbolize besides a website name?
The website cannot be accessed without the site admin's permission
The website is not accessible at the moment
The website is a secure website
The website needs a password to be accessed
Which of the following statements are Wrong in the context of "downloading files?
Never save the file in the root directory of the computer
Files must be scanned for viruses/Malware prior to using them
Before opening the file, save 011 Other work and close other programs
It is safe to open a file or run a program directly from a location Review
What does a lock icon symbolize besides a website name?
Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert_ On the subway an unknown person picks his pocket Along with his wallet Duke also lost the pen drive "with his pictures. Since he had not made any more copies of those pictures, he lost them forever. What type of data loss is this?
Natural disaster
Malware attack
Software theft
Hardware theft
Trojans are otherwise known as
Backdoors
Virus
Worm
Troy
Which of the following terms refers to software that attackers create to install on a victim's computer in order to compromise its security?
Lockbin
Drop box
Bitlocker
Malware
In asymmetric encryption…………
Two private keys are used
Two public keys are used
Similar keys are used
A public and private key is used
Which of the following refers to the patching of system files to fix any issues in the previous version of the windows os?
Windows firewall
Task manager
File vault
Windows Updates
Which of the following is the best example of a strong password?
Dad196g (something easy to remember like a name and birth date)
Pa44w0rd (a word that substitutes numbers for same of the letters)
PeteR%Offic3 (a name or phrase that mixes uppercase and Lowercase letters, numbers and symbols)
Good2go (a phrase that mixes letters and numbers)
This part of you about the address from it Came, time of the message. date Sent. And the subject line. Identify the email part?
Header
Signature
Footer
Body
What is Regedt32.exe?
Registered editor for 32 bit systems
Registry editor
Registered event viewer
Registered editor for windows
Sam uses his work laptop to watch pirated movies at home sometimes_ When he tried to watch the latest movie he downloaded: the movie file did not play even after trying on several different players. Within a day of this: Sam noticed that many of his files were vanishing one after the other from his laptop even though neither he nor anyone else deleted them_ The network administrator of his company: after taking a look at his computer told him that the movie files: which did not play: definitely had something to do With this peculiar behavior_ What type of data loss could this be?
Human error
Natural disaster
Software failure
Computer virus
Which Option will you choose to share files more securely?
HTTPS WebDAV folders
P2F networks
Share your root drive
FTP sites
Lucy, a 55-year-old woman: was not a technically savvy person. She did not install or enable any applications on her computer, and only used it for looking up recipes and knitting patterns. After some time, Lucy 's computer staffed giving her problems_ It often displayed the Blue Screen of Death (BSOD) and unwanted windows kept popping up whenever she went online. When a computer technician checked Lucy 's computer, it was discovered that her computer was infected with malware. Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her computer?
Windows Defender
Jump lists
Simple file sharing
Task manager
Which of the following option would you choose to secure e-mail messages?
Digital photograph
Digital signature
Digital autograph
Digital vote
Daniel, a bank officer: communicates with his clients through emails on a daily basis. Recently: he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed him: as it was difficult to filter the important emails_ Hence: he decided to find a solution for it_ Upon inquiry_ a service provider told him that he could use software which automatically filters out the unsolicited emails_ This software would not only protect his Gmail account: but also protect all the email accounts configured on his email client. Which of the following tools did Daniel probably enquire about?
Kapersky
Avast Pro
Norton
Spamfighter
Which of the following websites can Windows Phone users use to locate their stolen
ICloud.com
Http://vwm.symbianguru.com/tracking-mobile-with-phone-guardian.html
Account.microsoft.com/devices
Android.com/devicemanager
Which of the following statements is wrong regarding good password management?
Do not change passwords frequently
Do not share your passwords
Do not use easily guessable passwords
Do not Write down your passwords
What is a zombie machine?
Machine that accepts and acts On instructions from another machine
Machine that no accepts and acts on instructions from another machine
Machine that does not respond to any instruction
Machine that is dependant on another machine for resources
Which of the following terms refers to the process that ensures accuracy of the sender and receiver of a message?
Availability
Authenticity
Nonrepudiation
Data
Ross is going to an adventure camp with his friends. In the meantime, his cousins will be staying at his house. Since Ross cousins are very mischievous, he does not want them using his new windows laptop. What steps can be taken to prevent his cousins from accessing his laptop.
Installing and maintaining an antivirus
Creating backup copies of the important data
Using strong passwords to protect user accounts
Turning off the power supply to the computer
Kati shares her laptop with her brother Gorges. Kati has some personal photos in her folder, which she does not want Gorges to see. In what ways could Katie prevent Gorges from accessing her folder?
Using encryption
Using Backup
Using strong password
Using firewall
This tool can capture passwords When typed from the keyboard
Keylogger
Entrapper
Keylocker
Eavesdropper
John is an 18-year-old college-going student_ He loves to read books and listen to music on his laptop_ He regularly e-books and music from the internet. Lately "whenever John has been spending time on his laptop: the laptop begins displaying the infamous Blue Screen of Death (BSOD). Upon taking his laptop to the service center: John was told that his laptop was infected with malware_ Which symptom of malware infection is John' s laptop displaying?
Unexpected crashes
Slow system
Hard drive malfunction
Laptop screen malfunction
Computer viruses are most commonly spread by
Downloading pictures from the Web
Choosing weak computer passwords
Opening e-mail attachments
Reading jokes on the Internet
Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics and records obtained from people to improve the sales of the company. However, recently the statistics and records given to him have been incorrect, thus leading to gross miscalculations and wrong predictions on his part. Which of the terms listed below, best describes these statistics and records that are incorrect?
Data
Information
Indicators
Archives
Which service listens on port 25?
Pop
Ftp
Telnet
Smtp
Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it: as it was a gift from his late grandfather_ The iPhone also contained pictures that he had taken for a national photography contest_ Using which iOS feature: can Andrew locate his phone?
Find my iPhone
ICloud backup
SIM lock
System updates
Which key combination in Windows will lock your workstation?
([windows key]) + L
Alt + Shift
Alt + Shift Ctrl
Ctrl + Shift + Dell
As part of his security implementation plan, Glenn was updating his firewall. Which aspect of the security implementation plan was Glenn working on?
Maintenance
Reaction
Nonrepudiation
Precaution
Which of the following helps to backup data on a MAC?
Time Machine
App Store
Extensions
Internet Account
What are the three most common rise associated With "surfing the Web7V (Select 3 answers)
Contamination by a virus or Other malicious code
Theft of Credit card information
Theft of personal identity and other private information
Overloading computer system resource
Denial of service occurs when
ISPs notify a down time to users
An organization denies access to certain sites
Legitimate users are denied access to resources
Illegitimate users are Prevented from using resources
What should you do if you receive a call from someone in your computer support department asking for your password?
Inform them that there is no reason they should need your password and refuse to give them
Ask them Why they heed the password. If the reason sounds legitimate, go ahead and give to them
Give in to them without question
Send the password via e-mail to ensure you're giving in to the right person
Harry. a 21-year-old college-gomg student, Was Working on his dissertation when suddenly a message flashed on his screen, ‘’All files on your computer have been encrypted, you must pay $1000 within 72 hours to regain access to your data,’’ Even after Harry paid the money: he was not able to access his data and all the documents on his dissertation were lost. Which malware attack was Harry a victim of?
Ransomware
Virus
Bootnet
Adware
Choose the correct statement from the following
A personal firewall protects systems from Internet attacks to a certain extent
An antivirus is not needed when a firewall filters aII ports
An antivirus eliminates the need for a firewall
A personal firewall will check email attachments for malware
Sarah has recently rented a small room on ABC Street, and Started a business with seven employees. She provided every employee with a computer and a common printer Which is meant to be shared by everyone. Which of the following networks would suit Sarah’s business need?
Local Area Network
Ethernet physical layer
Wide area network
Virtual Private Network
Susan downloaded a software the Internet and installed it on her computer for watching movies online. After installing the noticed that her PC Was slowing down and Was taking more time to open webpages What could Susan do to solve this problem?
Install a latest antivirus software and scan her computer
Start using Ethernet
Choose the suitable encryption method
Stop using wireless internet connection
To find out which ports are open, which of the following commands will you use at the command prompt?
Netstat-a
Netbios-id
nbstat-a
Netshow —a
Horace is a 64-year-old man Who worked as an accountant for SN Associates before his retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not a technically savvy person: he did not install any applications on his laptop_ and only used it for checking his email and playing poker online. After some time, Horace laptop staffed giving him problems_ It crashed frequently: often displayed the Blue Screen of Death (BSOD): and unwanted windows kept popping up whenever he went online. When Horace took his laptop to the service center, he was told that his laptop was infected with malware. Which software should Horace have installed to prevent malware infection in his laptop?
Antivirus software
Skype
One Drive
Adobe Reader
Choose the correct statement
Threat is the existence of weakness or implementation error
Threat is a potential violation Of security
Threat is a defined way to breach Security through a vulnerability
Threat is an assault on System security
Hermione is a 21 year-old college student_ She loves spending time on Facebook_ However: With her final exams approaching: she feels that spending time on Facebook will harm her exam results_ Hence: she enables a particular Facebook feature_ With the help of which_ she will not get any emails or notifications from Facebook_ Which Facebook feature did Hermione use?
Deactivate account
Login alerts
Who Can look me up
Where you're logged in
Which of the following antivirus technique refers to the process of comparing the current state of stored programs to a previously recorded state, which is known to be free of malware?
Integrity Checking
Scanning
Bookmarks method
Heuristics analysis
Samuel, a network admin in an IT firm_ has just discovered a phishing site known for targeting corporate entities_ Several employees have received emails with the domain name: which is the same as that of this site. In order to prevent the company's network from being corrupted: Samuel decides to block all incoming and outgoing traffic from that site. Which of the following defense mechanisms can Samuel use to implement this?
Firewall
Encryption
Virus
Disk Encryption
Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?
Data security
Maintenance
Keystroke logging
Availability
A new online service allows people living with roommates to feed in all their house hold expenses in its 'share calculator' program_ The program then calculates how much each person IS supposed to pay and sends a detailed report to all those who are listed as roommates for that particular transaction. The above mentioned service is an example of which of the following?
Software as a Service
Platform as a Service
Network as a service
Infrastructure as a service
Gareth's parent found him watching porn online on the new Mac they gave him on his birthday. The obviously do not want gareth to repeat this behavior. What action can gareth's parent take to ensure this.
Parental control
Vaut
Time Machine
ICloud
If a person suspects his or her computer is infected with malware, which indicators can confirm that this is the case?
Pop ups
Scanning
Firewall
Suspicious behavior
Emma won a laptop at her college science fair. The laptop does not have antivirus software installed on it. Emma has to purchase one. What factors should Emma keep in mind before purchasing the software?
Doesn’t fully protection
Comprehensive protection
Compability
Conflicts
Gloria suspects that her laptop is infected with malware. Upon scanning the system using antivirus software, no malware is detected. Despite this, her laptop continues to display symptoms of malware infection. What may be the reason for this?
Antivirus does not detect malware
Random network activity
Choose a two factors
Ability to remove infections from computer sytem
Karen noticed that her son was not himself lately. He did not want to go to school or play with his friends and had a perpetual morose look on his face. When karen questioned him about this, he broke down and told her that some kids from his class made a facebook page just to ridicule his appearance and make fun of him publicy. What can Karen do to prevent further cyberbullying of her son
Informe their parents if they are being cyberbullied
Block the cyberbully's post, so that they cannot contact the child again
Keep a close eye on the child's social networking profile
Delete the child's social networking account
Harold just got home from working at Henderson LLC where he works as an IT technician. He was able to get off early because they were not too busy. When he walks into his home office, he notices his teenage daughter on the computer, apparently chatting with someone online. As soon as she hears Harold enter the room, she closes all her windows and tries to act like she was playing a game. When Harold asks her what she was doing, she acts very nervous and does not give him a straight answer. Harold is very concerned because he does not want his daughter to fall victim to online predators and the sort. Harold doesn't necessarily want to install any programs that will restrict the sites his daughter goes to, because he doesn't want to alert her to his trying to figure out what she is doing. Harold wants to use some kind of program that will track her activities online, and send Harold an email of her activity once a day so he can see what she has been up to. What kind of software could Harold use to accomplish this?
Install hardware Keylogger on her computer
Install screen capturing Spyware on her computer
Install VNC on her computer
Enable Remote Desktop on her computer
Joan recently introduced her 10 year old daughter Kloe to the internet to help her in her studies. Joan is a very cautious person and she does not want Kloe exposed to online threats. What steps can Joan take to prevent this?Joan recently introduced her 10 year old daughter Kloe to the internet to help her in her studies. Joan is a very cautious person and she does not want Kloe exposed to online threats. What steps can Joan take to prevent this?
Evite social networking sites
Restrict access to inappropriate websites using internet filtering software
Use kidzi
Play game
Monica, a 21 years old woman, regulary uploads selfies and statuses on facebook. Gina, who considers Monica to be her social rival, regulary post sarcastic and rude comments on Monica’s updates. In addition, some strangers have been posting vulgar comments on her photo as well. What steps can Monica take to prevent Gina and these strangers from viewing her facebook activity?
Who can see my posts
Block users
Deactivate your account
Who can contact me
Whats risks do people face on social networking sites if they are not careful about their online activity?
Identify theft
Malwarebyte
Email spoofing
Hijaking
An attachment, with according to the email, is a childhood picture of them. How should r as Richard make sure that the attachment is not malicious?
Use spamfighter
Scanning an attachment
Blocked sender
Turn off the preview feature
After a spate of email related threats and breaches at his him, Ryan has decided to improve the security measure to secure his company network. What email security measures should Ryan implement?
Blocked senders tab
Use HTTPS enabled email service provider
Check for last account activity
Use safari
After reading a research paper on data loss, Anne saved her important data on her Iphone. What application can back up its data on Iphone
ICloud
App Store
Vault
One drive
An attacker finds a web page for a target organization that supplies contact information for the company. Using available details to make the message seem authentic, the attacker drafts e-mail to an employee on the contact page that appears to come from an individual who might reasonably request confidential information, such as a network administrator. The email asks the employee to log into a bogus page that requests the employee's user name and password or click on a link that will download spyware or other malicious programming. Google’s Gmail was hacked using this technique and attackers stole source code and sensitive data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social engineering and malware websites that focused on targeted individuals working for the company. What is this deadly attack called?
Spear phishing attack
Trojan server attack
Social networking attack
Javelin attack
The management of a firm decided to replace all the desktop computers in its offices with laptops. The system administrator was instructed to sell the computers at a discounted rare to recover some of the cost of the upgrade. What should the system administrator do before selling of the computers?
Encrypt a data
Create an administrator account
Backup data
Install a firewall
Recently, Claire’s laptop was infected with malware and she took it to the service center to be formatted. What step’s can Claire take to prevent the same thing from happening again?
Use malwarebyte
Use Norton
Use backup
Use encryption
Phil noticed that this Wi-Fi data plan is getting exhausted earlier than usual for the past couple of months. He suspects that someone else may be tagging on to his Wi-Fi signal and using up the data. What can Phil do to secure his connection?
Use encryption WPA2
Use encryption WPA
Use encryption WEP
War driver
Ami works a as marketing executive for QW Agency. While coming home from work, Ami misplaced her recently purchased iphone. The loss of Ami’s iphone worried her as it contained the launch strategy of a new product, and Ami did not want it to fall into the wrong hands. How should Amy proceed in order to prevent the data from falling into the wrong hands as well as to recover her iphone?
Use Touch ID
Use find my Iphone
Encrypt your phone
Use dropbox
Bob has set up three web servers on Windows Server 2008 IIS 7.0. Bob has followed all the recommendations for securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of the potential for financial loss. Bob has asked his company's firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why will this not be possible?
Firewalls cannot inspect traffic at all, they can only block or allow certain ports
Firewalls can only inspect outbound traffic
Firewalls cannot inspect traffic coming through port 443
Firewalls cannot inspect traffic coming through port 80
Jackie is writing a novel and she feels that her manuscript would be safer if it is stored on could and not on local computer. After a bit research, she found out that even though could has its advantages, it faces several threats. What threats should Jackie be aware of before selecting a cloud service?
Spoofing
Hijacking
Technologies loop holes
Shared space
Max, a lawyer, has stored confidential data regarding his clients on could service. Of late, there have been many reported cases of could accounts being hacked. Max wants to make sure that his data is not stolen. What precautionary measures can Max take to protect his data? (select 2 answer)
Choose two step authentication
Use antivirus
Encrypt the data
Use owncloud
Give a password of this account to his administrator
What is security?
Security is the protection of information against a minimum of risk
Security is the integrity of the data
The security has stopped that the information must be available always
Security has the online backup of the data
What is implementing security?
Precaution, maintenance, reaction
Maintenance, reaction , Precaution
Restriction, functionaly, ease of use
Reaction, maintenance, precaution
What is windows defender?
Anti-spyware
Anti-virus
Anti-drone
Anti-backdoor
When discussing passwords, what is considered a brute force attack?
You attempt every single possibility until you exhaust all possible combinations or discover passwords
You threaten to use the rubber hose on someone unless they reveal their passwords
You load a dictionary of words into you cracking program
You create hashes of a large number of words and compare it with the encrypted the passwords
You wait until the passwords expire
A spyware is known as a data interception program.
True
False
{"name":"FINAL TEST", "url":"https://www.supersurvey.com/QPREVIEW","txt":"Test your knowledge on cybersecurity and online safety with our engaging quiz designed for students and enthusiasts alike. This quiz consists of 30 carefully crafted questions that challenge your understanding of various cybersecurity concepts.Key Features:Multiple choice and checkbox questionsImmediate feedback on your answersEnhance your knowledge of online security","img":"https:/images/course8.png"}
Make your own Survey
- it's free to start.