25 questions
Giving objects interactivity is known as ...
Big data
Digital security
internet of things
None is correct
Managing and analyzing huge volumes of data is called ...
Interent of things
Big data
Pasive security
Active security
Computer security is a set of measures aimed at protecting
hardware.
hardware and software.
the information and people.
hardware, software, information and people.
The set of actions aimed at protecting the computer and its content (information) is called ...
Active security
Passive security
People security
All responses are correct
Programs that hijack other programs to use their rights or to modify their behavior...
Hijacker
Virus
Trojan
Warm
Malicious Software...
Virus
Trojan
All are correct
Warm
Malicious program that pretends to overflow the system memory by reproducing itself is called ...
Virus
Worm.
Trojan
All are correct
The software that is in charge of obtaining and memorizing the keystrokes made on a keyboard is called ...
spyware
keylogger
adware
Hijacker
Viruses housed in seemingly harmless elements are called...
adware
hijacker
spyware
trojan
Advertising included in programs that show it after installed...
Keylogger.
Virus.
Adware
None are correct.
A hacker is...
a computer expert with malicious intent.
someone who introduces viruses to my computer
a computer expert who do not have to pretend to cause harm.
All answers are wrong.
Redirect a domain name to a different machine, so that the user who enters a URL accesses the attacker's web page...
Phising.
Pharming.
Cracking.
None is correct.
Computer expert dedicated to changing the way a commercial program works to pirate them.
Hackers
Hijackers
Crackers
Rackers
Cookies are...
text files that are stored on the computer through the browser when we visit a web page.
virus.
different types of hacker.
All answers are false.
Company-initiated email chains to collect the email addresses of many users and then do mailings...
pharming.
hoaxes.
phising.
crackers.
The CAPTCHA is...
a security system.
used so that access to the page or account is carried out only by human beings.
sometimes quite annoying and difficult to decode.
Todas las respuestas son correctas
MINIMIZE DAMAGE is...
active security.
malware
passive security.
None is correct.
Among the dangers that we face on the Internet, we can mention:
Involuntary access to illegal or harmful information.
Phishing, theft, and scams.
Loss of privacy and / or damage to our image, in addition to cyberbullying.
All of them are correct.
In some social networks it is not possible to delete the data that we have entered in them:
True, but only if you are a minor.
True, it is specified in the conditions of use and privacy policy of the social network.
False.
True, but it happens on all social networks.
Pages with a secure cryptographic protocol have the ...
HTPP
HTPPS
TCP/IP
IP4
To use strong passwords is a good advice:
True
False
A type of malware installs without user permission...
trojan.
hijacker.
spam.
virus.
E-mails that flood the network in order to advertise products, sometimes of dubious legality...
Cookies
Hijack
SPAM
All answers are false.
A correct advice is do not follow unknown people on the networks, and do not accept them either:
True.
False.
You can fill out forms that promise to give you a prize with personal data with total security:
True.
False.