1) The full form of virus is: a) Virus Information run under size b) Vital Information resources under seize c) Vitamin Information run under seize 2) A computer Virus is same as human virus. State True or False a) False b) True 3) Which of the following is considered as 'malware'? a) Virus b) Antivirus c) Firewall d) Trojan Horse 4) What is the process of encoding information in a way so that only someone with a key can decode it? a) Compression b) Systemic Variation c) Encryption 5) What is the another name for crackers-malicious hackers who infiltrate secure systems in order to steal information or cause damage? a) Black Hats b) Pirates c) Digital rogues 6) In terms of computer, what is a hash? a) A delicious way to cook potatoes b) An encrypted value c) A decryption key 7) What does SSL stands for? a) Secret Service Logarithm b) Systematic Security Level c) Secure Sockets Layer 8) What is a firewall? a) A filter of an internet connection b) Software that logs internet activity c) An antivirus software 9) Which term is used, when a network of computers that have transformed into bots-devices under the control of a third party? a) Phishing farm b) Revenge of the nodes c) Botnet 10) What is phishing? a) A method of online identity theft b) A decryption method that uses complex algorithms c) A way to send spam email to millions of people at once 11) Unwanted unsolicited messages, sent by unknown sources, are known as? a) Virus b) Trojans c) Hoaxes d) Spam 12) You see an unknown person taking photos in the office area of your school, what would you do? a) No issues join him. b) Ask them not to take the photos in secure areas like server rooms, reception area, office area, labs etc. c) Tell them to take permission from head of the school 13) Which of the following is the stronger password? a) ABC b) Abc@123 c) ABC123 d) ABc@123! 14) If you fall for a phishing scam, what should you do to minimize the damage? a) Delete the phishing email b) unplug the computer. This will get rid of any malware c) change any compromised passwords d) All of the above 15) Which of the following actions can be taken to restrict access to your files and devices? a) Update your software once a year b) share your password with trusted person like your friends,colleagues etc. c) regularly update your software for apps, web browsers and operations system. d) None of the above
0%
Internet Security
공유
공유
공유
만든이
Roop1030
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
비행기
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?