1.
What is the primary purpose of a firewall in network security?
Correct Answer
C. To filter and control incoming and outgoing network traffic
Explanation
A firewall is a network security device or software that is designed to monitor, filter, and control network traffic based on predetermined security rules. Its primary purpose is to act as a barrier between a trusted internal network and untrusted external networks, such as the internet, and to filter traffic to allow or block it based on security policies. This helps protect against unauthorized access, threats, and potential security breaches by controlling the flow of data in and out of a network. Firewalls play a crucial role in maintaining the security and integrity of a network.
2.
Junk e-mail, as in mass mailings, is annoying but harmless.
Correct Answer
B. False
Explanation
E-mail is open to the same abuses as regular mail or the telephone. Don't trust everything that arrives in your mailbox.
3.
The best way to avoid viruses is to not open unexpected e-mail attachments from unknown sources.
Correct Answer
B. False
Explanation
False - It used to be enough for user to ignore messages from unfamiliar people, but with viruses that exploit personal and organizational distribution lists, users must also be wary of their co-workers and other names that they may recognize.
4.
Messages that appear more than once in your e-mail box may be more suspect of carrying a virus.
Correct Answer
A. True
Explanation
True - You may receive the same e-mail from a virus repeatedly.
5.
Which of the following file types should never be opened?
Correct Answer
D. All of the above
Explanation
All of the above. These are all vectors for virus/malware infections.
6.
It is not safe to e-mail business documents to your home computer to work on them.
Correct Answer
A. True
Explanation
True - Your home computer environment is much less secure than work. You're exposing the business information to outside sources like attackers or competitors.
7.
What is a virus?
Correct Answer
C. A program that self-replicates
Explanation
A virus in the context of computer technology is a program that self-replicates and can infect and harm computer systems. It is not an email message, an image that embeds itself in a file directory, or data in various forms. Computer viruses are malicious software programs designed to replicate and spread, often causing damage to data and computer systems.
8.
Which of the following are examples of programs?
Correct Answer
B. Excel, PowerPoint, Access, and Word
Explanation
Excel, PowerPoint, Access, and Word - These are all examples of programs, just as viruses are programs.
9.
What is the most common delivery method for viruses?
Correct Answer
A. Email
Explanation
A. E-mail - While these are all delivery methods for viruses, most are propagated via e-mail messages.
10.
Which of the following terms generally fall under the descriptor "virus"?
Correct Answer
D. Both A and B
Explanation
Both A. and B. - Worms and Trojan Horses are generally described as viruses.
11.
What is your best defense against virus infection?
Correct Answer
A. Don't open e-mail attachments you're not expecting
Explanation
Because e-mail is the most common mode of propagation for viruses, opening unexpected attachments is dangerous.
12.
Which of the following message attachments would you be wise not to open? A message with an attachment that:
Correct Answer
D. All of the above
Explanation
All of the above. These are all common types of virus programs.
13.
It's safe, and more expedient, to conduct business via Instant Messaging.
Correct Answer
B. False
Explanation
Though it's convenient to discuss business matters in "real-time," instant messaging can be a security nightmare. Instant messaging software can store the content of an instant messaging session in a log-file that could be read by others.
14.
Which of the following can be viruses?
Correct Answer
D. All of the above
Explanation
These are all common types of virus programs.
15.
Instant Messaging is no more unsafe than regular email.
Correct Answer
B. False
Explanation
Instant messaging sessions are conducted in plain, unencrypted text, and are an open book to a reasonably skilled intruder. Instant messaging sessions are not virus protected. Also, during installation, some instant messaging software may change browser security settings, which places the computer at a high security risk.
16.
You should never respond to SPAM.
Correct Answer
A. True
Explanation
Never respond--not even to "unsubscribe"--unless the sender is legitimate. Do not open or forward chain e-mail or reveal personal information. You should also never buy anything from spam mail.
17.
It's OK to put your e-mail address on a Website.
Correct Answer
B. False
Explanation
Spam robots used by spammers can harvest your e-mail address if it is displayed on a website.
18.
Which of the following should you NOT do in order to protect your password.
Correct Answer
D. All of the above.
Explanation
All of the above - All of these behaviors could put your password at risk.
19.
Where should you write down your passwords.
Correct Answer
D. You should never write down your password.
Explanation
You should never write down your password.
20.
Which of the following is a good way to create a password?
Correct Answer
D. A combination of upper and lowercase letters mixed with numbers and symbols.
Explanation
The best passwords contain a combination of upper and lowercase letters mixed with numbers and symbols.
21.
Which of the following would be the best password?
Correct Answer
B. AC&3i7
Explanation
The best passwords contain a combination of upper and lowercase letters mixed with numbers and symbols.
22.
Your password should be changed...
Correct Answer
D. Regularly
Explanation
It's generally recommended to change passwords regularly for enhanced security, typically every few months. This practice reduces the risk of unauthorized access due to compromised credentials. However, the frequency may vary depending on individual or organizational security policies and the sensitivity of the accounts.
23.
Bandwidth is not affected by downloading files from the Internet to your PC.
Correct Answer
B. False
Explanation
Accessing streaming media hogs bandwidth. Downloading MP3 and other large files steals server space.
24.
If you're not careful about your Internet browsing, which of the following can be the result?
Correct Answer
D. All of the above.
Explanation
All of the above - Spyware is installed on your computer to secretly gather information about your usage and relay it to advertisers or other interested parties. Viruses can be transmitted in a downloaded file. Sensitive corporate and personal information can be transmitted.