1) The full form of virus is: a) Virus Information run under size b) Vital Information resources under seize c) Vitamin Information run under seize 2) A computer Virus is same as human virus. State True or False a) False b) True 3) Which of the following is considered as 'malware'? a) Virus b) Antivirus c) Firewall d) Trojan Horse 4) What is the process of encoding information in a way so that only someone with a key can decode it? a) Compression b) Systemic Variation c) Encryption 5) What is the another name for crackers-malicious hackers who infiltrate secure systems in order to steal information or cause damage? a) Black Hats b) Pirates c) Digital rogues 6) In terms of computer, what is a hash? a) A delicious way to cook potatoes b) An encrypted value c) A decryption key 7) What does SSL stands for? a) Secret Service Logarithm b) Systematic Security Level c) Secure Sockets Layer 8) What is a firewall? a) A filter of an internet connection b) Software that logs internet activity c) An antivirus software 9) Which term is used, when a network of computers that have transformed into bots-devices under the control of a third party? a) Phishing farm b) Revenge of the nodes c) Botnet 10) What is phishing? a) A method of online identity theft b) A decryption method that uses complex algorithms c) A way to send spam email to millions of people at once 11) Unwanted unsolicited messages, sent by unknown sources, are known as? a) Virus b) Trojans c) Hoaxes d) Spam 12) You see an unknown person taking photos in the office area of your school, what would you do? a) No issues join him. b) Ask them not to take the photos in secure areas like server rooms, reception area, office area, labs etc. c) Tell them to take permission from head of the school 13) Which of the following is the stronger password? a) ABC b) Abc@123 c) ABC123 d) ABc@123! 14) If you fall for a phishing scam, what should you do to minimize the damage? a) Delete the phishing email b) unplug the computer. This will get rid of any malware c) change any compromised passwords d) All of the above 15) Which of the following actions can be taken to restrict access to your files and devices? a) Update your software once a year b) share your password with trusted person like your friends,colleagues etc. c) regularly update your software for apps, web browsers and operations system. d) None of the above

Internet Security

autors:

Līderu saraksts

Vizuālais stils

Iespējas

Pārslēgt veidni

Atjaunot automātiski saglabāto: ?