This quiz from the Computers Memory Chapter 9 focuses on cybersecurity threats and prevention methods. It assesses knowledge on spyware, viruses, worms, firewalls, and anti-theft measures for computing devices, crucial for anyone learning or working in IT security.
Stealth
Multipartite
Polymorphic
Worm
Rate this question:
a Trojan horse
A virus
A worm
A zombie
Rate this question:
Personal
Biological
Identity
Biometric
Rate this question:
Engineering
Theft
Pretexting
Pharming
Rate this question:
Prank
Joke
Legend
Hoax
Rate this question:
Encryption code
Virus signature
Compression code
Virus pattern
Rate this question:
Change your password frequently.
Create a hard-to-guess password, with a combination of letters, numbers, and symbols.
keep your password written down and stored in any easy-to-remember location.
Keep your password a secret.
Rate this question:
modems
Routers
Switches
Network interface cards (NICs)
Rate this question:
A worm
A time bomb
A script virus
An e-mail virus
Rate this question:
Boot-sector virus
Time bomb
Logic bomb
Trojan horse
Rate this question:
Information recorders
Keystroke loggers
Spy loggers
Keystroke spies
Rate this question:
Antivirus software
Host program
Hard drive
Files on the computer
Rate this question:
Logical port blocking
Static addressing.
Packet switching.
Packet filtering.
Rate this question:
Convert logical ports to physical port configurations
hide user IP addresses from the Internet
Dynamically assign IP addresses via an ISP
Translate IP addresses from the Internet
Rate this question:
Macro
Stealth
Logic
Rate this question:
Attaching a motion alarm.
Installing software that can signal your notebook's location.
Installing an external hard drive.
Locking your notebook to a work surface.
Rate this question:
Firewall
Packet filter
A packet sniffer
Antivirus filter
Rate this question:
Entering through its Internet connection
overhearing your password and log-on information
Sitting down at a computer and installing hacking software
Entering through a company intranet
Rate this question:
Scanning
Inoculation
Quarantining
Encryption
Rate this question:
Script virus
Macro virus
Polymorphic virus
Worm
Rate this question:
Old surge protectors can deliver power to your computer without protecting it.
Power surges can be blocked by using a computer surround.
Data line surges can be blocked by using a computer surround
It is best to unplug computers during an electrical storm.
Rate this question:
Trojan horse
Packet sniffer
Backdoor program
DDoS
Rate this question:
Quiz Review Timeline (Updated): Mar 16, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Intellectual Output 2: Chapter 1 Safe Use Of Internet And Social Media, Self Assesment Test
This self-assessment test covers essential aspects of safe internet and social media use, including cybersecurity threats like malware, the importance of secure connections, and...
Questions:
10 |
Attempts:
76 |
Last updated:
Aug 25, 2023
|
Computer And Network Security Practice Questions!
Dive into key concepts of computer and network security with this practice quiz! Topics include decryption, virus identification, RSA algorithm, cryptanalysis, TLS, and key...
Questions:
20 |
Attempts:
835 |
Last updated:
May 25, 2024
|
CYBER CRIMES & IPR
Explore key aspects of cybersecurity and intellectual property rights in the CYBER CRIMES & IPR quiz. Assess your understanding of viruses, phishing, illegal downloading, scams,...
Questions:
10 |
Attempts:
112 |
Last updated:
Mar 20, 2023
|
True / False Exercise-Societal Impact
This quiz evaluates understanding of cybersecurity topics like malware, hacking, and ethical hacking, emphasizing their societal impacts.
Questions:
10 |
Attempts:
249 |
Last updated:
Mar 21, 2023
|
FTC Cybersecurity Basics Quiz
Test your understanding of cybersecurity basics by selecting the correct response for each question or statement.
Questions:
5 |
Attempts:
1027 |
Last updated:
Mar 21, 2023
|
Activity 3.1 - Principals Of Cybersecurity
Based on the measures provided, select the most appropriate CIA component the measure is safeguarding against.
Questions:
7 |
Attempts:
1215 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.