Computer & Internet/Network Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Quizbygeohac
Q
Quizbygeohac
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,122
Questions: 30 | Attempts: 4,122

SettingsSettingsSettings
Computer & Internet/Network Security - Quiz

This quiz will test (as well as measure) your knowledge on computer and network/internet security. Some questions only require basic knowledge of security, while other questions require a bit more knowledge. How much do you know. . . Or don't you know? Find out.


Questions and Answers
  • 1. 

    Which of the following is most likely to send spam emails from your computer?

    • A.

      Trojan

    • B.

      Worm

    • C.

      Virus

    • D.

      Spyware

    • E.

      Adware

    Correct Answer
    B. Worm
    Explanation
    A worm is most likely to send spam emails from your computer. Unlike viruses and Trojans, worms are capable of spreading themselves without any user interaction. They can replicate and spread across networks, infecting multiple computers and using them to send out spam emails. Worms often exploit vulnerabilities in operating systems or software to gain unauthorized access to computers and use them for malicious activities, such as sending spam. Therefore, a worm is the most likely culprit for sending spam emails from your computer.

    Rate this question:

  • 2. 

    Which of the following is most likely to steal your identity?

    • A.

      Trojan

    • B.

      Worm

    • C.

      Virus

    • D.

      Spyware

    • E.

      Adware

    Correct Answer
    D. Spyware
    Explanation
    Spyware is most likely to steal your identity because it is designed to gather personal information without the user's knowledge or consent. It can track your online activities, capture sensitive data such as passwords and credit card information, and send it to a third party. Unlike viruses or worms, which are mainly focused on causing damage to your computer, spyware specifically targets your personal information for malicious purposes.

    Rate this question:

  • 3. 

    Which of the following is less likely to be detected with standard antivirus software?

    • A.

      Trojan

    • B.

      Worm

    • C.

      Virus

    • D.

      Spyware

    • E.

      Adware

    Correct Answer
    E. Adware
    Explanation
    Adware is less likely to be detected with standard antivirus software because it is a type of software that displays unwanted advertisements on a user's device. Unlike viruses, worms, trojans, spyware, which are malicious and harmful, adware is often considered a low-level threat. It is designed to generate revenue for the creators by displaying ads, and it may not always exhibit the same characteristics as traditional malware. Standard antivirus software may not prioritize detecting or removing adware since it is not directly harmful to the user's device or data.

    Rate this question:

  • 4. 

    DoS attacks cannot be launched against routers.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    DoS (Denial of Service) attacks can indeed be launched against routers. A DoS attack aims to overwhelm a target device or network with a flood of illegitimate requests or traffic, causing it to become unresponsive or crash. Routers, being a critical component of a network infrastructure, are often targeted by hackers to disrupt network connectivity or gain unauthorized access. Different types of DoS attacks, such as TCP/IP attacks, SYN floods, or ICMP floods, can be directed towards routers, exploiting vulnerabilities in their software or overwhelming their processing capabilities. Therefore, the statement that DoS attacks cannot be launched against routers is false.

    Rate this question:

  • 5. 

    Auditing is used to secure the network and systems on your network.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Auditing is not used to secure the network and systems on your network. Auditing is a process of examining and analyzing various aspects of a network or system to ensure compliance with established policies and procedures. It involves reviewing logs, records, and other data to identify any vulnerabilities or potential security risks. While auditing can help identify security issues, it is not the primary method for securing the network and systems. Other security measures such as firewalls, encryption, access controls, and regular patching are typically used to secure the network and systems.

    Rate this question:

  • 6. 

    This is a series of messages sent by someone attempting to break into a computer to learn which network services the computer provides.

    • A.

      Bit robbing

    • B.

      Jabber

    • C.

      Port scan

    • D.

      Service profile identifier

    Correct Answer
    C. Port scan
    Explanation
    A port scan is a technique used by hackers to identify open ports on a computer or network. By sending messages to various ports, the hacker can determine which network services are running on the target computer. This information is valuable for planning further attacks or exploiting vulnerabilities in the system.

    Rate this question:

  • 7. 

    Which of the following network operating system logon restrictions is most likely to stop a hacker who is attempting to discover someone's password through a brute force or dictionary attack?

    • A.

      Total time logged on

    • B.

      Time of day

    • C.

      Period of time after which a password expires

    • D.

      Number of unsuccessful logon attempts

    Correct Answer
    D. Number of unsuccessful logon attempts
    Explanation
    The number of unsuccessful logon attempts is the most likely restriction to stop a hacker attempting to discover someone's password through brute force or dictionary attack. This restriction would limit the number of attempts a hacker can make before being locked out, making it difficult for them to guess the correct password.

    Rate this question:

  • 8. 

    Deliberate software attacks are referred to as:

    • A.

      Malware

    • B.

      Malicious code

    • C.

      Malicious software

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above" because deliberate software attacks can be categorized as malware, malicious code, or malicious software. Malware refers to any software designed to harm a computer system, while malicious code specifically refers to harmful instructions or scripts within software. Malicious software encompasses any software created with malicious intent, including both malware and malicious code. Therefore, all three terms are appropriate descriptions for deliberate software attacks.

    Rate this question:

  • 9. 

    What IDS identifies intrusions based on a preset database that identifies known attack signatures?

    • A.

      Host Based IDS

    • B.

      Behavior Based IDS

    • C.

      Knowledge Based IDS

    • D.

      Network Based IDS

    Correct Answer
    C. Knowledge Based IDS
    Explanation
    A Knowledge Based IDS identifies intrusions based on a preset database that contains known attack signatures. This means that the IDS is programmed with specific patterns or characteristics of known attacks, and it compares incoming network traffic or system activity against these patterns. If a match is found, the IDS triggers an alert or takes appropriate action to mitigate the intrusion. This type of IDS relies on a database of knowledge about known attacks, making it effective in detecting and preventing known threats.

    Rate this question:

  • 10. 

    What port does secure HTTP use?

    • A.

      1701

    • B.

      1512

    • C.

      443

    • D.

      80

    Correct Answer
    C. 443
    Explanation
    Secure HTTP, also known as HTTPS, uses port 443. This port is specifically designated for secure web communications using the SSL/TLS protocols. By using port 443, HTTPS ensures that the data exchanged between the client and the server is encrypted and secure from unauthorized access. Port 443 is widely used for secure online transactions, banking, and any other activities that require a secure connection over the internet.

    Rate this question:

  • 11. 

    DoS is a

    • A.

      Disk operating system

    • B.

      Denial of service attack

    • C.

      Detected on-going service

    Correct Answer
    B. Denial of service attack
    Explanation
    A denial of service attack (DoS) is a type of cyber attack where an attacker overwhelms a system or network with a flood of illegitimate requests, causing it to become unavailable to its intended users. This can be done by exploiting vulnerabilities in the system, such as consuming all available resources or crashing the system. A DoS attack aims to disrupt the normal functioning of a service or website, making it inaccessible to legitimate users.

    Rate this question:

  • 12. 

    Security updates are needed to:

    • A.

      Improve flaws in installed programs and operating systems to resolve vulnerabilities

    • B.

      Improve program design and functionality

    • C.

      Make programs easier to use

    • D.

      To boost vendor’s profits

    Correct Answer
    A. Improve flaws in installed programs and operating systems to resolve vulnerabilities
    Explanation
    Security updates are necessary to improve flaws in installed programs and operating systems in order to resolve vulnerabilities. These updates aim to address any weaknesses or loopholes that may exist in the software, making it less prone to attacks or unauthorized access. By identifying and patching these flaws, the updates enhance the overall security of the system, protecting it from potential threats and ensuring the safety of user data.

    Rate this question:

  • 13. 

    What is the main problem of a modern antivirus?

    • A.

      High price and the absence of free telephone support

    • B.

      False positives

    • C.

      Dependence on antivirus signatures

    • D.

      High memory and cpu

    Correct Answer
    C. Dependence on antivirus signatures
    Explanation
    The main problem of a modern antivirus is its dependence on antivirus signatures. Antivirus programs rely on signatures to identify known malware and viruses. However, this approach is not effective against new and unknown threats. As cybercriminals constantly create new malware variants, antivirus programs may not be able to detect them without an updated signature database. This limitation makes antivirus programs less reliable in protecting against emerging threats and requires constant updates to stay effective.

    Rate this question:

  • 14. 

    Which of the following commands typed in the “RUN” menu in Windows will NOT help you find out and configure which programs are allowed to be auto-started on a system?

    • A.

      “services.msc”

    • B.

      “IPconfig/all”

    • C.

      “regedit”

    • D.

      “msconfig”

    Correct Answer
    B. “IPconfig/all”
    Explanation
    The command "IPconfig/all" is used to display the IP configuration settings for all network interfaces on a Windows system. It does not provide any information or configuration options related to auto-started programs.

    Rate this question:

  • 15. 

    What is a hash?

    • A.

      An encrypted value

    • B.

      A decryption key

    • C.

      Code used to compress data

    Correct Answer
    A. An encrypted value
    Explanation
    A hash is a type of encryption that converts data into a fixed-size string of characters. It is used to securely store and transmit sensitive information such as passwords. The encrypted value produced by a hash function is irreversible, meaning it cannot be decrypted to obtain the original data. Therefore, it provides a high level of security and is commonly used in various applications to protect data integrity and ensure authentication.

    Rate this question:

  • 16. 

    What does SSL stand for?

    • A.

      Secret Service Logarithm

    • B.

      Systematic Security Level

    • C.

      Secure Sockets Layer

    Correct Answer
    C. Secure Sockets Layer
    Explanation
    SSL stands for Secure Sockets Layer. This is a cryptographic protocol that provides secure communication over a network. It ensures that the data transmitted between a web server and a browser remains encrypted and protected from unauthorized access. SSL is commonly used to secure online transactions, such as credit card payments, login credentials, and sensitive information exchange. By encrypting the data, SSL helps to prevent eavesdropping, data tampering, and identity theft.

    Rate this question:

  • 17. 

    A (n) ________ is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems.

    • A.

      IDS

    • B.

      Firewall

    • C.

      Honeypot

    • D.

      CT decoy

    Correct Answer
    C. Honeypot
    Explanation
    A honeypot is a computer system that is intentionally designed to attract and deceive hackers or unauthorized users attempting to gain access to other computer systems. It acts as a trap, luring these individuals into interacting with the system while monitoring their activities. The purpose of a honeypot is to gather information about potential threats, study attack techniques, and enhance the security of real systems by diverting malicious activity away from them.

    Rate this question:

  • 18. 

    I use a Mac therefore I’m not exposed to security threats.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because using a Mac does not guarantee immunity from security threats. While Macs are generally considered to be more secure than Windows PCs due to their smaller market share and built-in security features, they are still vulnerable to malware, phishing attacks, and other security risks. No computer system is completely immune to security threats, and it is important for Mac users to take appropriate precautions such as using strong passwords, keeping software up to date, and using antivirus software.

    Rate this question:

  • 19. 

    __________ is a method used by firewalls to filter and block unauthorized traffic.

    • A.

      Heuristic Scanning

    • B.

      Stateful/Packet Inspection

    • C.

      Intrusion Detection

    • D.

      Active Scripting

    Correct Answer
    B. Stateful/Packet Inspection
    Explanation
    Stateful/Packet Inspection is a method used by firewalls to filter and block unauthorized traffic. This technique examines the entire network communication session, rather than just individual packets, to determine if the traffic is authorized or not. It keeps track of the state of the connection and uses this information to make decisions about allowing or blocking traffic. This method provides a higher level of security and is more effective in detecting and preventing unauthorized access to a network.

    Rate this question:

  • 20. 

    A hardware firewall is just a (n) ________ running on a dedicated piece of hardware or specialized device.

    • A.

      Software Firewall

    • B.

      Intrusion Detection System

    • C.

      Router

    • D.

      Switch

    Correct Answer
    A. Software Firewall
    Explanation
    A hardware firewall is a type of firewall that is implemented using dedicated hardware or specialized devices. In contrast, a software firewall is a firewall that is implemented using software running on a computer or server. Therefore, the correct answer is "Software Firewall" as it refers to a firewall that is running on a dedicated piece of hardware or specialized device.

    Rate this question:

  • 21. 

    A system that monitors traffic into and out of a network and automatically alerts you when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n)

    • A.

      IDS

    • B.

      Firewall

    • C.

      Router

    • D.

      Antivirus

    • E.

      None of the above

    Correct Answer
    A. IDS
    Explanation
    An IDS, or Intrusion Detection System, is a system that monitors network traffic and alerts the user when suspicious traffic patterns are detected. This can indicate a possible unauthorized intrusion attempt. Unlike a firewall or router, which primarily focus on blocking or allowing traffic based on predetermined rules, an IDS is specifically designed to detect and notify about potential intrusions. Antivirus software, on the other hand, is primarily used to detect and remove malware from a system, rather than monitoring network traffic. Therefore, the correct answer is IDS.

    Rate this question:

  • 22. 

    Zone Alarm is an example of a ________ firewall.

    • A.

      Personal

    • B.

      Corporate

    • C.

      IDS

    • D.

      None of the above

    Correct Answer
    A. Personal
    Explanation
    Zone Alarm is an example of a personal firewall. A personal firewall is a type of firewall that is installed on an individual's personal computer or device to protect it from unauthorized access and malicious activities. It provides security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Zone Alarm is a popular personal firewall software that offers features such as intrusion detection, application control, and privacy protection to ensure the safety of personal devices and data.

    Rate this question:

  • 23. 

    You need to use multiple antivirus applications on the same computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Using multiple antivirus applications on the same computer is not recommended as they can conflict with each other and cause performance issues. Having multiple antivirus programs running simultaneously can lead to resource conflicts, slow down the computer, and potentially even create false positives or negatives in detecting threats. It is generally advised to use only one reliable antivirus program to ensure proper protection without any conflicts.

    Rate this question:

  • 24. 

    You need to update your antivirus definition files regularly.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Regularly updating antivirus definition files is important because new viruses and malware are constantly being developed. By updating the antivirus definition files, you ensure that your antivirus software has the latest information on these threats, allowing it to effectively detect and remove them from your system. Failing to update the definition files regularly could leave your computer vulnerable to new and emerging threats. Therefore, the statement "You need to update your antivirus definition files regularly" is true.

    Rate this question:

  • 25. 

    Windows updates are not necessary.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Windows updates are necessary for several reasons. They provide security patches to protect against new threats and vulnerabilities, fix bugs and issues in the operating system, and improve the overall performance and stability of the system. Regularly updating Windows ensures that the system is up to date with the latest features and enhancements, and helps to keep the system running smoothly. Therefore, the statement that Windows updates are not necessary is false.

    Rate this question:

  • 26. 

    You can get a virus just by opening and reading your email.

  • 27. 

    If you want to see unbiased tests of antivirus applications, where do you go?

    • A.

      Television

    • B.

      Antivirusware.com

    • C.

      Av-comparatives.org

    • D.

      Unbiasedavtests.org

    Correct Answer
    C. Av-comparatives.org
    Explanation
    Av-comparatives.org is the correct answer because it is a reputable website that conducts unbiased tests of antivirus applications. This website provides detailed and objective reviews, comparisons, and rankings of different antivirus software, helping users make informed decisions about which antivirus program to use. It is a reliable source for unbiased information on antivirus applications.

    Rate this question:

  • 28. 

    Passwords stop an intruder who gains physical access to a computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Passwords do not stop an intruder who gains physical access to a computer. Once an intruder has physical access to a computer, they can bypass the password protection by various means, such as resetting the password or accessing the computer's files directly. Therefore, passwords alone are not sufficient to protect against intruders who have physical access to a computer.

    Rate this question:

  • 29. 

    How should you protect your wireless network?

    • A.

      Don't broadcast your SSID

    • B.

      Use encryption

    • C.

      Only let known computers connect to your access point.

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    To protect your wireless network, you should implement all of the mentioned measures. Not broadcasting your SSID (Service Set Identifier) makes your network less visible to potential attackers. Using encryption, such as WPA2, ensures that the data transmitted over the network is secure and cannot be easily intercepted. Only allowing known computers to connect to your access point adds an extra layer of security by preventing unauthorized devices from accessing your network. By implementing all of these measures, you can significantly enhance the security of your wireless network.

    Rate this question:

  • 30. 

    Encryption should be considered for internal network traffic as well as external network traffic.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Encryption should be considered for both internal and external network traffic because it helps to protect sensitive information from unauthorized access or interception. Internal network traffic may still be vulnerable to attacks from insiders or compromised devices, so encrypting the data ensures that even if it is intercepted, it cannot be read without the proper decryption key. Additionally, encrypting internal traffic helps to maintain confidentiality and integrity within the network, preventing unauthorized users from accessing or tampering with sensitive data. Therefore, encryption should be implemented for both internal and external network traffic to ensure the security of the network.

    Rate this question:

  • 31. 

    Encrypting sensitive data on a hard drive means

    • A.

      Only I can see and use it.

    • B.

      Only someone who knows the decryption password can see and use it.

    • C.

      No one can see it, but everyone can use it.

    • D.

      No one can use it, but other administrators may see it with my permission.

    Correct Answer
    B. Only someone who knows the decryption password can see and use it.
    Explanation
    Encrypting sensitive data on a hard drive ensures that it is protected from unauthorized access. By encrypting the data, it becomes unreadable to anyone who does not have the decryption password. This means that only someone who knows the decryption password can successfully decrypt and view the sensitive data. Additionally, the encryption does not restrict the usage of the data, as the authorized user who knows the decryption password can still use the data once it is decrypted.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 29, 2009
    Quiz Created by
    Quizbygeohac
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.