1) The full form of virus is: a) Virus Information run under size b) Vital Information resources under seize c) Vitamin Information run under seize 2) A computer Virus is same as human virus. State True or False a) False b) True 3) Which of the following is considered as 'malware'? a) Virus b) Antivirus c) Firewall d) Trojan Horse 4) What is the process of encoding information in a way so that only someone with a key can decode it? a) Compression b) Systemic Variation c) Encryption 5) What is the another name for crackers-malicious hackers who infiltrate secure systems in order to steal information or cause damage? a) Black Hats b) Pirates c) Digital rogues 6) In terms of computer, what is a hash? a) A delicious way to cook potatoes b) An encrypted value c) A decryption key 7) What does SSL stands for? a) Secret Service Logarithm b) Systematic Security Level c) Secure Sockets Layer 8) What is a firewall? a) A filter of an internet connection b) Software that logs internet activity c) An antivirus software 9) Which term is used, when a network of computers that have transformed into bots-devices under the control of a third party? a) Phishing farm b) Revenge of the nodes c) Botnet 10) What is phishing? a) A method of online identity theft b) A decryption method that uses complex algorithms c) A way to send spam email to millions of people at once 11) Unwanted unsolicited messages, sent by unknown sources, are known as? a) Virus b) Trojans c) Hoaxes d) Spam 12) You see an unknown person taking photos in the office area of your school, what would you do? a) No issues join him. b) Ask them not to take the photos in secure areas like server rooms, reception area, office area, labs etc. c) Tell them to take permission from head of the school 13) Which of the following is the stronger password? a) ABC b) Abc@123 c) ABC123 d) ABc@123! 14) If you fall for a phishing scam, what should you do to minimize the damage? a) Delete the phishing email b) unplug the computer. This will get rid of any malware c) change any compromised passwords d) All of the above 15) Which of the following actions can be taken to restrict access to your files and devices? a) Update your software once a year b) share your password with trusted person like your friends,colleagues etc. c) regularly update your software for apps, web browsers and operations system. d) None of the above
0%
Internet Security
Delen
Delen
Delen
door
Roop1030
Inhoud Bewerken
Afdrukken
Embedden
Meer
Toewijzingen
Scorebord
Meer weergeven
Minder weergeven
Dit scoreboard is momenteel privé. Klik op
Delen
om het publiek te maken.
Dit scoreboard is uitgeschakeld door de eigenaar.
Dit scoreboard is uitgeschakeld omdat uw opties anders zijn dan die van de eigenaar.
Opties Herstellen
Vliegtuig
is een open template. Het genereert geen scores voor een scoreboard.
Inloggen vereist
Visuele stijl
Lettertypen
Abonnement vereist
Opties
Template wisselen
Alles weergeven
Er zullen meer templates verschijnen terwijl je de activiteit gebruikt.
Open resultaten
Kopieer link
QR-code
Verwijderen
Automatisch opgeslagen activiteit "
" herstellen?