1) What does IP stand for? a) Internet Protocol b) Internal Protocol c) Internet Provider d) Internal Provider 2) True or False: An IP address is a unique identifier for a computer on the internet. a) False b) true 3) Fill in the blank: To find your IP address, you need to open the _______ command in your computer. a) cmd b) cmt c) cnt d) all of the above 4) What is the purpose of an IP address? a) To connect to Wi-Fi b) To identify a device on a network c) To store files d) To improve speed 5) What command do you type in the command prompt to find your IP address? a) ipaddress b) configip c) ipconfig d) addressip 6) What line shows your IP address in the command prompt? a) Ethernet adapter b) Wireless adapter c) Network interface d) Default gateway 7) What is the keyboard shortcut to open the Clear Browsing Data window in Google Chrome?** a) Shift + Ctrl + Delete b) Shift + Ctrl + Supr c) Ctrl + Alt + Delete d) Alt + F4 8) Which type of data can be deleted from your browser? a) Browsing history b) Download history c) Cached images and files d) All of the above 9) Fill in the blank: Clearing browsing data can help improve your ________.* a) health b) the computers security c) your privacy  d) all of the above 10) True or False: Cookies store user preferences and login information. a) true b) false 11) What is the purpose of 'Cached images and files'? a) To save user passwords b) To speed up the loading of websites c) To track user activity d) To delete old files 12) In the screenshot you take, what should be highlighted? a) The entire screen b) The navigation data you want to delete c) Your desktop background d) The taskbar 13) What is a digital footprint? a) A physical mark left by a foot b) The trail of data you leave online c) A type of online game d) A method of tracking locations 14) Which of the following can improve your online security? a) Sharing passwords with friends b) Ignoring privacy settings c) Using public Wi-Fi for banking d) Using strong, unique passwords 15) What can happen if you do not protect your personal information? a) You may receive more spam emails b) Your identity could be stolen c) You might lose access to your accounts d) All of the above 16) Fill in the blank: Always check your privacy ________ on social media platforms a) media b) messages c) settings d) address 17) What is one example of sensitive information you should not share online? a) Your favorite color b) Your secret jokes with friends c) Home address d) Cash money  18) What can you do to reduce your digital footprint? a) Post everything online b) Regularly review your privacy settings c) Use the same password for all accounts d) Ignore security updates 19) What is a domain name? a) A physical location of a server b) A unique name that identifies a website c) A type of email address d) A programming language 20) Fill in the blank: Footprinting is the process of gathering ________ about a target system a) photos b) foots c) information 21) Which of the following is a type of virus? a) Worm b) Trojan horse c) Ransomware d) all of the above  22) True or False: A Trojan horse virus disguises itself as a legitimate program. a) true  b) false 23) What is the primary purpose of a phishing attack? a) To speed up internet browsing b) To infect a system with malware c) To steal personal information d) To improve network security 24) Fill in the blank: A ________ is a malicious software that replicates itself to spread to other computers. a) bug b) virus c) IP address 25) What is the primary purpose of footprinting? a) To create websites b) To develop new software c) To increase social media followers d) To gather information for security reasons 26) Why might a company perform footprinting on its own systems? a) To recruit new employees b) To advertise their products c) To find weaknesses before hackers do d) To increase website traffic 27) Which of the following is a method used in phishing? a) Sending real bank statements b) Sending fake emails that look legitimate c) Offering free products in stores d) Hosting webinars about online security 28) What might happen if you click a link in a phishing email? a) You will receive a discount coupon b) Your computer will automatically update c) You might be taken to a fake website d) You will be redirected to a news site

Tabla de clasificación

Estilo visual

Opciones

Cambiar plantilla

¿Restaurar actividad almacenada automáticamente: ?