1.
Which of the following would NOT pose a security risk
Correct Answer
B. Music Files
Explanation
Music files would not pose a security risk because they are typically audio files that do not have the ability to execute code or perform any actions that could potentially harm a system. Unlike Word Documents, Program Files, and Applications, which can contain executable code and potentially harmful scripts, music files are generally safe and do not have the capability to carry out any malicious activities.
2.
Which of the following is an example of the type of soft/hardware your computer should have in order to protect itself from attack.
Correct Answer
C. OS Updates
Explanation
OS updates are necessary for protecting a computer from attacks. Operating system updates often include security patches that fix vulnerabilities and bugs, making it harder for attackers to exploit them. By regularly updating the operating system, users ensure that their computer has the latest security measures in place, reducing the risk of being compromised by hackers or malware. Firefox is a web browser, not a soft/hardware for computer protection, and spyware is a type of malware that poses a threat rather than protecting the computer.
3.
What is a virus?
Correct Answer
C. A program that attempts to copy itself to yours and other machines
Explanation
A virus is a type of malicious program that is designed to replicate itself and spread to other machines. It does not necessarily cause damage to your machine or delete programs, although it can potentially do so. The primary characteristic of a virus is its ability to self-replicate and infect other machines, often without the user's knowledge or consent. This allows it to spread and potentially cause harm to multiple systems.
4.
Which of these is an anti-virus program?
Correct Answer
C. Norton
Explanation
Norton is an anti-virus program. It is a well-known and widely used software that provides protection against various types of malware, including viruses, spyware, and ransomware. Norton offers real-time scanning, automatic updates, and advanced security features to keep users' devices safe from cyber threats. It is a trusted name in the industry and has a good reputation for its effectiveness in detecting and removing malicious software.
5.
What is a firewall designed to do?
Correct Answer
D. Only allowing selected things in and out
Explanation
A firewall is a security device that is designed to monitor and control incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The purpose of a firewall is to selectively allow or block certain types of traffic based on predetermined security rules. By doing so, it helps to protect the network from unauthorized access, malicious attacks, and the spread of viruses or malware. Therefore, the correct answer is "Only allowing selected things in and out."
6.
What is spyware?
Correct Answer
D. All of the above
Explanation
Spyware is a type of malicious software that is designed to monitor and gather information about a user's activities without their knowledge or consent. It can track keystrokes, capture screenshots, record browsing history, and more. Additionally, spyware can also send this collected data back to a third party, compromising the user's privacy and security. Furthermore, spyware has the capability to install other applications on the infected device, further compromising its functionality and potentially leading to more malicious activities. Therefore, the correct answer is "All of the above" as all the given options accurately describe the characteristics and behavior of spyware.
7.
Name an operating system that's not Windows
Correct Answer
D. Linux
Explanation
Linux is the correct answer because it is an operating system that is not Windows. Linux is a free and open-source operating system that is widely used in various devices, including servers, desktop computers, and mobile devices. It was developed by Linus Torvalds and has a large community of contributors who continuously improve and update it. Apple OS Y is not a correct answer as it is not a recognized operating system.
8.
Which if the following is key to staying safe online
Correct Answer
C. Running the operating system update regularly
Explanation
Running the operating system update regularly is key to staying safe online. This is because operating system updates often include important security patches that address vulnerabilities and protect against potential threats. By regularly updating the operating system, users ensure that their devices have the latest security features and are less susceptible to cyber attacks. Ensuring that Amazon is up to date and installing/maintaining a good CC application are also important for online safety, but they are not as crucial as regularly updating the operating system.
9.
Which of the following is the best browser?
Correct Answer
F. Errrrrm, there is no best browser?
Explanation
The given answer "Errrrrm, there is no best browser?" is the best answer because the choice of a browser depends on personal preference and individual needs. Different browsers have different features, speed, security, and compatibility with websites. What may be the best browser for one person may not be the same for another. Therefore, it is subjective to determine a universally best browser, making the given answer the most appropriate.
10.
What are the 3 Rs
Correct Answer
C. Responsibility Risk and Reputation
Explanation
The three Rs in this context refer to Responsibility, Risk, and Reputation. Responsibility implies being accountable for one's actions and decisions. Risk refers to the potential for loss or harm that may arise from these actions or decisions. Reputation refers to the perception or opinion that others have of an individual or organization based on their actions and behavior. These three factors are interconnected, as being responsible and managing risks effectively can help protect and enhance one's reputation.
11.
What kind of details are easily discoverable by a webmaster?
Correct Answer
C. The area you live
Explanation
A webmaster can easily discover the area you live in by analyzing your IP address or through other tracking techniques. However, it is important to note that a webmaster cannot easily obtain your specific address, name, or phone number without your consent or providing that information voluntarily on a website. These details are typically considered private and require explicit permission or disclosure from the user.
12.
What type of internet technology does Opera Turbo use?
Correct Answer
A. Proxy server
Explanation
Opera Turbo uses a proxy server as its internet technology. A proxy server acts as an intermediary between the user's device and the internet, optimizing and compressing web pages before they are delivered to the user. This helps in reducing the amount of data that needs to be transferred, resulting in faster browsing speeds and reduced data usage.
13.
What is the problem with using proxy servers?
Correct Answer
D. Your IP address can be forwarded on
Explanation
Using proxy servers can pose a problem because your IP address can be forwarded on. When you connect to a website through a proxy server, the website sees the IP address of the proxy server instead of your own. However, the proxy server can still forward your IP address to the website, potentially compromising your privacy and anonymity. This can be a concern for individuals who wish to keep their online activities private or want to access restricted content without being traced.
14.
What is a noise search?
Correct Answer
B. When you mix genuine and false search terms
Explanation
A noise search refers to the act of mixing genuine and false search terms. This means that instead of using accurate and relevant keywords, the search includes both correct and incorrect terms, leading to a less precise or accurate search result. This can be done intentionally or unintentionally and may result in irrelevant or misleading information.
15.
What is one of the problems with using web archives?
Correct Answer
A. They can produce unusual requests from the host website
Explanation
One of the problems with using web archives is that they can generate unusual requests from the host website. When accessing web archives, the archived content is retrieved from the host website's server, which may result in unexpected or unusual requests being sent to the server. This can potentially overload the server or cause it to respond in unpredictable ways, affecting the user experience and the functionality of the web archive.
16.
What are plug-ins?
Correct Answer
D. A series of additions to your web browser
Explanation
Plug-ins are additional software components that can be added to a web browser to enhance its functionality. They provide extra features and capabilities that are not included in the browser's default settings. These additions can include tools for viewing multimedia content, blocking advertisements, managing downloads, and improving security. Plug-ins are designed to customize and optimize the browsing experience according to the user's needs and preferences.
17.
What does private browsing NOT do?
Correct Answer
A. It does not hide your IP address
Explanation
Private browsing, also known as incognito mode, is a feature in web browsers that allows users to browse the internet without saving any browsing history, cookies, or other data. However, it does not hide the user's IP address. The IP address is a unique identifier assigned to each device connected to the internet, and private browsing does not alter or conceal this information. Therefore, even when using private browsing, websites and online services can still see the user's IP address and potentially track their online activities.
18.
Google SSL allows you to do what?
Correct Answer
D. Encrypts both your search terms and results
Explanation
Google SSL (Secure Sockets Layer) encrypts both your search terms and results. SSL is a security protocol that ensures the confidentiality and integrity of data transmitted between a web browser and a web server. By encrypting the search terms, it prevents unauthorized access to the specific keywords you search for. Additionally, it encrypts the search results, making it difficult for anyone to intercept or tamper with the information displayed on the search results page. This encryption enhances privacy and security while using Google's services.
19.
What is a key benefit of Tor?
Correct Answer
B. It hides your IP address from the site you are visiting
Explanation
Tor is a network that allows users to browse the internet anonymously. It achieves this by routing internet traffic through a series of volunteer-operated servers, encrypting the data at each step. The benefit of Tor is that it hides the user's IP address from the site they are visiting. This means that the website cannot trace the user's location or identity based on their IP address. By keeping the user's IP address hidden, Tor enhances privacy and security while browsing the internet.
20.
What is the main downside to using Tor?
Correct Answer
C. You don't know whose computers your traffic is passing through
Explanation
The main downside to using Tor is that you don't know whose computers your traffic is passing through. Tor works by routing your internet traffic through a network of volunteer-operated servers, called nodes, which makes it difficult to trace the origin of the traffic. While this provides anonymity, it also means that your data could potentially be intercepted or monitored by malicious nodes. This lack of transparency regarding the routing of your traffic is a significant drawback of using Tor.
21.
What should you NOT do on a deniable connection?
Correct Answer(s)
D. Send a message from your webmail account
E. Check your internet banking account
Explanation
On a deniable connection, you should not send a message from your webmail account or check your internet banking account. This is because a deniable connection is a type of connection that allows you to browse the internet privately and anonymously, without leaving any trace of your online activities. Sending a message from your webmail account or accessing your internet banking account would require you to log in with your personal information, which could potentially compromise your anonymity and privacy. Therefore, it is advised to avoid such activities on a deniable connection.