The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Is an application that broadcast information to the server
B.
Is a software that can monitor your use on the computer
C.
Is a spying software used by detectives only
D.
Is a database to record user's information
Correct Answer
B. Is a software that can monitor your use on the computer
Explanation Spyware is a type of software that can monitor and track a user's activities on a computer. It is designed to collect information without the user's knowledge or consent. This information can include browsing habits, keystrokes, passwords, and other sensitive data. Spyware can then transmit this information to a remote server, where it can be accessed and used for various purposes, such as targeted advertising, identity theft, or espionage. Its primary function is to secretly monitor and gather information about a user's computer usage.
Rate this question:
2.
Anti spyware can prevent your computer from being monitored?
A.
True
B.
False
Correct Answer
A. True
Explanation Anti-spyware software is designed to detect and remove spyware, which is a type of malicious software that can secretly monitor and collect information from a computer. By actively scanning for and removing spyware, anti-spyware software can effectively prevent a computer from being monitored by unauthorized individuals or entities. Therefore, the statement that anti-spyware can prevent your computer from being monitored is true.
Rate this question:
3.
What does "HTTPS" stand for?
Correct Answer Hypertext transfer protocol secured
Explanation HTTPS stands for Hypertext Transfer Protocol Secure. It is the secure version of HTTP, which is the protocol used for transmitting data over the internet. The "S" in HTTPS stands for "Secure" and indicates that the communication between the user's browser and the website is encrypted and protected from unauthorized access. This encryption ensures that sensitive information, such as passwords or credit card details, transmitted between the user and the website remains secure and cannot be intercepted by malicious individuals.
Rate this question:
4.
When a user receives an email that directs them to an unreliable website in order to get user's details, is called?
A.
Pharming
B.
Smishing
C.
Phishing
D.
Hacking
Correct Answer
C. pHishing
Explanation Phishing refers to the act of tricking users into revealing their personal information, such as login credentials or financial details, by posing as a trustworthy entity in an email or website. In this scenario, the user is directed to an unreliable website with the intention of obtaining their details. This aligns with the concept of phishing, where the attacker attempts to deceive the user and gain unauthorized access to their sensitive information.
Rate this question:
5.
What is Pharming?
A.
Is the same as Phishing
B.
A way to seek for user's private life
C.
The email link you click on directs you to a fake website
D.
When you type the correct URL it directs you to a fake website
Correct Answer
D. When you type the correct URL it directs you to a fake website
Explanation Pharming is a type of cyber attack where the attacker redirects the user to a fake website even when they type the correct URL. Unlike phishing, which involves tricking users into revealing their personal information, pharming manipulates the DNS system or uses malware to redirect users to fraudulent websites. This can lead to users unknowingly entering their sensitive information on fake websites, putting their privacy and security at risk.
Rate this question:
6.
When a person receives a text message and is asked to follow the link to claim the prize, it is called Smishing?
A.
True
B.
False
Correct Answer
A. True
Explanation Smishing refers to a type of cyber attack where scammers use text messages to deceive individuals into revealing personal information or clicking on malicious links. In this scenario, the person receiving the text message is being asked to follow a link to claim a prize, which aligns with the definition of smishing. Therefore, the correct answer is true.
Rate this question:
7.
Emails that are sent out to the recipients from a mailing list are called?
Correct Answer Spam
8.
When someone creates a facebook account with your name and pictures, it is called hacking.
A.
True
B.
False
Correct Answer
B. False
Explanation Creating a Facebook account with someone else's name and pictures is not considered hacking. Hacking typically involves unauthorized access to someone's account or computer system. However, creating a fake account with someone's name and pictures is a form of impersonation or identity theft, which is a separate offense.
Rate this question:
9.
Regularly checking your ___________________ can keep you alert on any fraud that may occur on your credit card.
Correct Answer Bank statement
Explanation Regularly checking your bank statement can keep you alert on any fraud that may occur on your credit card. By reviewing your bank statement regularly, you can monitor all the transactions made using your credit card and quickly identify any unauthorized or suspicious charges. This allows you to take immediate action, such as contacting your bank or credit card company to report the fraud and prevent further unauthorized transactions. Being proactive in checking your bank statement helps ensure the security of your credit card and financial information.
Rate this question:
10.
You should use a ____________ on your email accounts so that unwanted emails do not appear in your inbox.
Correct Answer Filter
Explanation Using a filter on your email accounts helps in preventing unwanted emails from appearing in your inbox. Filters allow you to set specific criteria or rules for organizing incoming emails. By creating filters, you can automatically sort emails into different folders, mark them as spam, or delete them altogether. This helps in reducing clutter and ensures that only relevant and desired emails reach your inbox.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.