Internet Safety, Security And Marketing Tools! Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ppageegsd
P
Ppageegsd
Community Contributor
Quizzes Created: 14 | Total Attempts: 9,450
Questions: 12 | Attempts: 144

SettingsSettingsSettings
Internet Safety, Security And Marketing Tools! Quiz - Quiz

.


Questions and Answers
  • 1. 

    What is spam?

    • A.

      Malicious code that includes virus and worms that can infect computers

    • B.

      Unwanted or unsolicited electronic messages

    • C.

      Software that runs at startup designed to take control of your computer

    • D.

      Security Prevention And Maintenance (S.P.A.M)

    Correct Answer
    B. Unwanted or unsolicited electronic messages
    Explanation
    Spam refers to unwanted or unsolicited electronic messages. These messages are typically sent in bulk to a large number of recipients without their consent. Spam can include various types of content such as advertisements, scams, phishing attempts, or malicious links. It is considered a nuisance and can clog up email inboxes, consume storage space, and potentially contain harmful content.

    Rate this question:

  • 2. 

    The act of disguising a website as a  legitimate one in order to gain access to personally identifiable information (PII) is known as _____.

    • A.

      Pharming

    • B.

      Phishing

    • C.

      Spamming

    • D.

      Tracking

    Correct Answer
    A. pHarming
    Explanation
    Pharming is the act of disguising a website as a legitimate one in order to gain access to personally identifiable information (PII). It is a form of online fraud where attackers redirect users to a fake website that looks identical to the original, tricking them into entering their sensitive information. Unlike phishing, which relies on luring victims through deceptive emails or messages, pharming directly redirects users to a fraudulent website without their knowledge or consent. This technique is used to steal personal data such as usernames, passwords, credit card details, and more.

    Rate this question:

  • 3. 

    Mel receives and e-mail allegedly from his mobile phone service provider. It has the company logo prominently featured at the top of the communication and states that the company is updating all client records. Mel is asked to re-submit his account information including name, address, home phone number and the credit card number tied to his account for billing purposes.  This could be an example of _______

    • A.

      Flaming, and Mel should sent a hostile reply.

    • B.

      A legitimate request, and Mel should respond including all the required information.

    • C.

      Phishing, and Mel should promptly delete the message.

    • D.

      Spam, similar to other harmless, unsolicited email messages.

    Correct Answer
    C. pHishing, and Mel should promptly delete the message.
    Explanation
    The given scenario is an example of phishing, where an attacker impersonates a legitimate company to trick individuals into providing their personal and financial information. The email asks Mel to submit sensitive details like his credit card number, which is a common tactic used by phishers. To protect himself from potential fraud or identity theft, Mel should promptly delete the message and not respond or provide any information.

    Rate this question:

  • 4. 

    Sending insulting messages across peer-to-peer networks is an example of _______

    • A.

      Flaming

    • B.

      Jabbing

    • C.

      Peering

    • D.

      Networking

    Correct Answer
    A. Flaming
    Explanation
    Flaming refers to the act of sending insulting or aggressive messages over the internet, often in online communities or through peer-to-peer networks. This behavior is characterized by the intention to provoke or offend others, typically resulting in heated arguments or conflicts. It is a form of cyberbullying or harassment that aims to create a hostile environment and negatively impact the targeted individuals.

    Rate this question:

  • 5. 

    This sophisticated piece of software tracks what users are typing on a website.

    • A.

      Flash cookie

    • B.

      Tracker

    • C.

      Beacon

    • D.

      Third-party monitor

    Correct Answer
    C. Beacon
    Explanation
    A beacon is a small piece of code embedded in a website that allows tracking of user activity, such as what they are typing. It is a sophisticated tool used to monitor user behavior and collect data. Unlike flash cookies, trackers, or third-party monitors, a beacon specifically focuses on tracking user input on a website.

    Rate this question:

  • 6. 

    An IP or internet protocol address is an example of ______________

    • A.

      Non PII

    • B.

      PII

    • C.

      A user profile

    • D.

      Both A and B

    Correct Answer
    A. Non PII
    Explanation
    An IP address is an example of non PII (Personally Identifiable Information) because it does not directly identify an individual. It is a unique numerical label assigned to each device connected to a computer network. While it can be used to determine the general location of a device, it does not reveal specific personal information about the user. Therefore, an IP address is considered non PII.

    Rate this question:

  • 7. 

    You can optimize your search results on the Web by ____

    • A.

      Using reliable resources such as EBSCO and recognized news sites.

    • B.

      Using several different types of search engines.

    • C.

      Sticking to your topic and avoiding distractions.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The correct answer is "all of the above." By using reliable resources such as EBSCO and recognized news sites, you can ensure that the information you find is accurate and trustworthy. Additionally, using several different types of search engines can help you access a wider range of information and perspectives. Finally, sticking to your topic and avoiding distractions allows you to focus on the most relevant search results. Therefore, by doing all of these things, you can optimize your search results on the web.

    Rate this question:

  • 8. 

    Which of the following statements about meta-search engines is NOT true?

    • A.

      Meta-search engines scan multiple search engine databases.

    • B.

      Meta-search engines are a waste of time becasue they provide very few results.

    • C.

      Meta-search engines provide results basd on the keyword(s) subited.

    • D.

      Meta-search engines can save time, but you shouldn't rely on them exclusively

    Correct Answer
    B. Meta-search engines are a waste of time becasue they provide very few results.
    Explanation
    Meta-search engines are not a waste of time because they provide very few results. In fact, meta-search engines can be beneficial as they scan multiple search engine databases and provide results based on the keyword(s) submitted. While they can save time by aggregating results from various search engines, it is not advisable to rely on them exclusively as they may not cover all search engines or provide comprehensive results.

    Rate this question:

  • 9. 

    Which of the following is an example of an accurately constructed Boolean search string?

    • A.

      Internet marketing

    • B.

      Internet AND marketing

    • C.

      Marketing ON internet

    • D.

      Marketing (internet)

    Correct Answer
    B. Internet AND marketing
    Explanation
    The correct answer is "internet AND marketing" because it uses the Boolean operator "AND" to combine the two search terms "internet" and "marketing". This means that the search results will only include pages that contain both of these terms, narrowing down the search and making it more specific.

    Rate this question:

  • 10. 

    Flash cookies serve the following purpose:

    • A.

      To remember preferences such as volume settings for video

    • B.

      To allow you to watch videos on sites that use this Adobe tool

    • C.

      To track your activities online for the purpose of targeted advertising

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Flash cookies serve all of the above purposes. They can remember preferences such as volume settings for videos, allowing a personalized experience for users. They also enable users to watch videos on sites that use Adobe Flash. Additionally, flash cookies can track users' activities online, which can be used for targeted advertising.

    Rate this question:

  • 11. 

    Explain the similarities and differences between "Favorites" and "Social Bookmarking" sites.  (NOTE:  This constructed response will be scored separately.)

  • 12. 

    RSS provides an efficient way for an internet user to ______________

    • A.

      Track Really Special Sites (RSS).

    • B.

      Use a "reader" to review information compiled from a number of sources based on pre-selected preferences.

    • C.

      Send information to a number of Real-Time Syndicated Sources (RSS) for posting.

    • D.

      Access peer-to-peer communication by launching this Remote Surveillance System (RSS).

    Correct Answer
    B. Use a "reader" to review information compiled from a number of sources based on pre-selected preferences.
    Explanation
    RSS provides an efficient way for an internet user to use a "reader" to review information compiled from a number of sources based on pre-selected preferences. This means that instead of visiting multiple websites individually to check for updates, the user can subscribe to RSS feeds from their favorite websites and have the content delivered to their reader. The reader collects and displays the latest updates from all the subscribed sources in one place, making it easier for the user to stay updated with the latest information without the need for manual checking.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 19, 2010
    Quiz Created by
    Ppageegsd
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.