1.
A worm is...
Correct Answer
B. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
Explanation
In the case of computers, a worm is a piece of code that usually invades your computer through upatched software and replicates itself until it reaches the internet and spreads there as well.
2.
The way I operate my computer can affect other people.
Correct Answer
A. True
Explanation
If you do not protect your computer it can be used by hackers to spread viruses and other threats.
3.
You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
Correct Answer
B. No
Explanation
you should make sure that any antivirus and other programs are up to date before going to the internet and certainly before entering any type of personal information.
4.
Why might someone break into (hack) your computer?
Correct Answer
E. All of the above
Explanation
Any one of these reasons might cause someone to hack your computer.
5.
If you recieve an email claiming to need your username and/or password, what should you do?
Correct Answer
A. Report it as pHishing/spam through your email provider
Explanation
deleteing the message is an option, but reporting the message as phishing makes your email provider alert to the scams that are prevalent and take action to block them. Never respond to a request for personal information.
6.
Both email atachments and downloaded files can spread malware.
Correct Answer
A. True
Explanation
Always scan attachments and files with antivirus before installing them on your computer. Don't open anything that you aren't expecting or doesn't come from a trusted source.
7.
What is the best way to protect your information when you are away from your computer?
Correct Answer
A. Lock the computer with a password
Explanation
Even if you shut down the computer, someone could restart it and have access to your personal information unless you passowrd protect the computer.
8.
What is a firewall?
Correct Answer
C. A filter for an internet connection that monitors outgoing and incoming activity.
Explanation
A firewall is a filter for an internet connection that monitors outgoing and incoming activity. It acts as a barrier between a private internal network and the public internet, controlling the flow of network traffic. It examines the data packets passing through it and decides whether to allow or block them based on predefined security rules. By monitoring and filtering network traffic, a firewall helps to protect against unauthorized access, malware, and other cyber threats, ensuring the security and integrity of the network.
9.
A strong password should contain:
Correct Answer
C. At least 8 characters, and a combination of letters, numbers, and characters.
Explanation
A strong password should contain at least 8 characters and a combination of letters, numbers, and characters. This is because longer passwords are generally more secure and harder to crack. Including a mix of uppercase and lowercase letters, numbers, and special characters adds complexity and makes the password harder to guess or brute force. Using a word that is easy to remember, such as the name of a pet, can make the password more vulnerable to dictionary attacks or guessing based on personal information. Therefore, it is important to have a password that meets the criteria of being at least 8 characters long and includes a combination of letters, numbers, and characters.
10.
Social engineering is:
Correct Answer
B. Scams distributed through email such as pHishing, pHarming and impersonation.
Explanation
This is one of the newer definitions for email scams that involve tricking a user into providing personal information.