1) The full form of virus is: a) Virus Information run under size b) Vital Information resources under seize c) Vitamin Information run under seize 2) A computer Virus is same as human virus. State True or False a) False b) True 3) Which of the following is considered as 'malware'? a) Virus b) Antivirus c) Firewall d) Trojan Horse 4) What is the process of encoding information in a way so that only someone with a key can decode it? a) Compression b) Systemic Variation c) Encryption 5) What is the another name for crackers-malicious hackers who infiltrate secure systems in order to steal information or cause damage? a) Black Hats b) Pirates c) Digital rogues 6) In terms of computer, what is a hash? a) A delicious way to cook potatoes b) An encrypted value c) A decryption key 7) What does SSL stands for? a) Secret Service Logarithm b) Systematic Security Level c) Secure Sockets Layer 8) What is a firewall? a) A filter of an internet connection b) Software that logs internet activity c) An antivirus software 9) Which term is used, when a network of computers that have transformed into bots-devices under the control of a third party? a) Phishing farm b) Revenge of the nodes c) Botnet 10) What is phishing? a) A method of online identity theft b) A decryption method that uses complex algorithms c) A way to send spam email to millions of people at once 11) Unwanted unsolicited messages, sent by unknown sources, are known as? a) Virus b) Trojans c) Hoaxes d) Spam 12) You see an unknown person taking photos in the office area of your school, what would you do? a) No issues join him. b) Ask them not to take the photos in secure areas like server rooms, reception area, office area, labs etc. c) Tell them to take permission from head of the school 13) Which of the following is the stronger password? a) ABC b) Abc@123 c) ABC123 d) ABc@123! 14) If you fall for a phishing scam, what should you do to minimize the damage? a) Delete the phishing email b) unplug the computer. This will get rid of any malware c) change any compromised passwords d) All of the above 15) Which of the following actions can be taken to restrict access to your files and devices? a) Update your software once a year b) share your password with trusted person like your friends,colleagues etc. c) regularly update your software for apps, web browsers and operations system. d) None of the above
0%
Internet Security
共享
共享
共享
由
Roop1030
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
飞机游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?