Computer Security Quiz
Factors that damage computer hardware include?
Power surges, Overheating, Humidity, Magnetic fields
Which of the following are online annoyances?
Spam, Spyware, Spoofing
A damaging program duplicating itself on a single computer or over a network is called a _____________.
Worm
Firewalls help protect against _______________ and _______________.
Worms and hackers
An unwelcome e-mail message is called __________.
spam
One of the main differences between free and free-based antivirus software is _______________.
the number of features
Select what is true about session cookies.
Determine the start and end of a session, Analyze and. measure traffic on a web page, Determine the web browser being used
A person with unlawful access to networks to steal and corrupt information and data is called a ________________.
Hacker
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.
IP Address
Cyberattacks include ______________ and ________________.
Identity Theft and DDoS Attacks
Rootkits enable a remote user to do which of the following?
Install rogue files, Create backdoor programs, Delete files
Firewall software used to block Internet-specific content of a user is called an _________ filter.
Internet
What is true about packet sniffers?
Legitimate sniffers are used for routine examination and problem detection, Unauthorized sniffers are used to steal information
Common computer virus infection indicators include ______________, ______________, and ______________.
OS doesn't launch properly, Files get deleted or encrypted, Strange error messages or pop-up ads
In each browser's settings area you should consider ______________, _______________, and _______________.
Periodically deleting cookies, Blocking/customizing your cookie settings, Decide from which sites you want to allow cookies
Sometimes spam messages are referred to as ____________.
UBE
Choose what is true about cookie privacy risks.
Websites using cookies can collect your information and sell it to third parties, Websites can track your surfing behavior and create a profile, Corporate and government entitles can track your web behavior
Identify what is true about script kiddies.
Are amateur computer hackers with little programming expertise, Illegally gain access to computer systems using programs (scripts) that others have written
A virus signature is the software ____________ of a particular computer virus.
Code