1.
If you create a password and don't think you can remember it, you should:
Correct Answer
C. Write down a hint that only makes sense to you and keep it secure.
Explanation
Never write down passwords, even if you intend to put them somewhere safe they can fall into the wrong hands.
2.
A business that you deal with often sends you an email that looks somewhat different than normal and asks for personal information. What should you do?
Correct Answer
B. Call the business and verify that the email is from them- but still don't respond to the email.
Explanation
never trust any email that asks for personal information. reputable businesses will not do this.
3.
On a social networking site such as Facebook, you should:
Correct Answer
C. Be careful what personal information you post, and use privacy settings.
Explanation
You should always be careful what information you disclose on the internet, even on "private' sites.
4.
Before you make a purchase online, you should look for:
Correct Answer
E. Answers A and B
Explanation
these are the very minimum security measures you should take before making an online purchase.
5.
It is safe to use an unknown wireless internet connection, such as those in coffee shops.
Correct Answer
B. False
Explanation
Unknown, and more importantly unsecured, wireless connections are always a gamble. Someone ma be able to access your computer through an unsecured connection.
6.
What is a trojan horse?
Correct Answer
B. A computer program that pretends to be one thing but causes harm when accessed.
Explanation
While answer A is technically correct, a trojan horse in computer security is a program that acts as the one in the Greek myth. It appears to be a legitimate thing, but releases malicious code.
7.
Malware includes viruses, worms, spyware, adware, and spam.
Correct Answer
B. False
Explanation
While spam emails may include malware, the emails themselves are not considered malicious software.
8.
The underlying principle of social engineering is that it is easier to trick people than to hack into computers.
Correct Answer
A. True
Explanation
Social engineering attacks employ fake emails, links, etc to gain user information.
9.
The #1 thing you can do to avoid malware is:
Correct Answer
A. Install antivirus software and keep it updated.
Explanation
While the others aren't bad ideas, the antivirus software is the best way to avoid malware.
10.
It is safe to download files from the internet as long as you have antivirus installed.
Correct Answer
B. False
Explanation
Even with antivirus software, you will want to create a separate folder to save all downloaded files and then run virus scans on them. don't rely on your real-time protection to catch everything.
11.
What should you consider when looking for a good anti-virus software?
Correct Answer
D. All of the above
Explanation
All of these questions are factors that should be considered when choosing an anti-virus program.
12.
A hardware firewall is a wireless router.
Correct Answer
B. False
Explanation
While a hardware firewall is indeed a router, it is not necessarily wireless.
13.
A good antivirus program will both perform scans on your compter and provide real-time protection.
Correct Answer
A. True
Explanation
A good antivirus program is designed to provide comprehensive protection for your computer. Performing regular scans helps to detect and remove any existing malware or viruses that may have infected your system. Additionally, real-time protection constantly monitors your computer's activities and blocks any potential threats in real-time, preventing them from causing harm. Therefore, a good antivirus program should have both scanning capabilities and real-time protection to ensure the highest level of security for your computer.
14.
When should an average user create backups?
Correct Answer
B. Once a week
Explanation
While once a week is usually adequate, a heavier user may want to save files as they are created.
15.
Program vendors create updates for software when:
Correct Answer
B. A new virus is found and the software is patched to avoid infection.
Explanation
Program vendors create updates for software when a new virus is found and the software is patched to avoid infection. This is because new viruses pose a threat to the security and functionality of the software. By creating updates and patches, vendors can address vulnerabilities and provide users with a more secure and stable version of the software. This helps to protect users' data and systems from potential attacks or infections caused by the new virus.
16.
Common and widely used software products are often a target for hackers.
Correct Answer
A. True
Explanation
Common and widely used software products are often a target for hackers because they have a larger user base, making it more appealing for hackers to exploit vulnerabilities and gain access to a larger number of potential victims. Additionally, popular software products are more likely to have known vulnerabilities, as they are extensively tested and scrutinized by security researchers, which can be exploited by hackers. Therefore, it is true that common and widely used software products are often targeted by hackers.