Q.1
What is software?
  • Viruses on your computer
  • Programs used by a computer
  • Documents used to type information on
  • Harmful information
Q.2
What is a firewall?
  • A wall made of fire in your computer to make sure your computer is heated up and running properly.
  • A software used to attack other security measures in your computer to insure your computer is safe.
  • A filter that filters incoming data, protecting a network from attacks.
Q.3
What is Cyber security?
  • All the tools we use and actions we take to keep computers safe.
  • Protecting your computer against hackers
  • Being secure against cyber bots
Q.4
What is malware?
  • Hackers trying to hack your computer.
  • Term for any software that is designed to harm or do illegal activities.
  • Term for cookies trying to invade your computer and implement viruses.
Q.5
What is a Trojan Horse?
  • A big wooden horse used to attack Troy in ancient Greece.
  • A program with hidden malicious functions.
  • A program that tricks your computer and destroys it with the power of Social engineering.
Q.6
What is a worm?
  • A worm you see outside in the dirt.
  • A software used to worm into your computer.
  • Malware that can infect and spread without human assistance.
Q.7
What is netiquette?
  • A term used to describe network attacks.
  • A malware that pretends to have ethical standards but attacks you when you least suspect it.
  • The term for commonly accepted rules of how to behave online.
Q.8
Which of the following is a true statement?
  • Updated antimalware programs always find the latest threats on a system.
  • Opening e-mail attachments is a common attack vector for malware.
  • USB drives are no longer vulnerable to malware infection.
  • Heuristic analysis of systems can find only previously known viruses or threats.
Q.9
What are loT devices?
  • Anything that is connected to the internet.
  • Smartphones, smart lightning, and connected speakers.
  • Devices that need a special key to unlock them.
  • Devices that require security procedures in order to keep them as uncompromised as possible, ex: Government computers.
Q.10
What does BIOS stand for?
  • It doesn't stand for anything
  • Basic Input Output System
  • Boots In One Second
  • Basically, I'm the Origin of the System
Q.11
What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?
  • Use of insecure Wi-Fi networks
  • Key-Logging
  • De-anonymization by network operators
  • Phishing attacks
Q.12
What is spyware?
  • Malware that collects information about you without your consent or knowledge.
  • A program that looks through you laptop camera and allows your FBI Agent to see you.
  • A program that allows you to become a better spy and gives you tools to spy on your friends.
Q.13
Which of the following statements is true of defenders of belief?
  • Their communities do not facilitate activities like sales and marketing.
  • They seek conformity and want to convince others of the wisdom of their opinions.
  • They are effective for activities that involve innovation and problem solving.
  • When confronted with contrary evidence, they change their opinion.
Q.14
What does compliance mean?
  • providing secure access to user data
  • using honest means to bypass security measures
  • conducting tests to identify vulnerabilities in a system
  • following the rules or standards that have been established
Q.15
A cookie that remains until an expiration date is met is:
  • session cookie
  • secure cookie
  • persistent cookie
  • super cookie
Q.16
What does a Trojan Horse do?
  • Makes the computer stop working
  • Attaches inside of program
  • Gets full access
  • Gets full access
Q.17
Self-replicating malware is known as a ____.
  • rootkit
  • worm
  • macro virus
  • logic bomb
Q.18
A(n) ____ is a device that captures phone numbers and related information on outgoing phone calls.
  • ECPA
  • pen register
  • keylogger
  • Trojan horse
Q.19
Which of the following four passwords is the most secure?
  • Boat123
  • WTh!5Z
  • into*48
  • 123456
Q.20
What damage can be caused by malware?
  • Computer crashes
  • The compromising personal information, which may lead to identity theft
  • Permanent deletion
  • All of the above
0 h : 0 m : 1 s