QUIZ
COMPUTER SECURITY (Images: Flirck)
susanadvtecno
2 hours ago
Save
Copy and Edit
INSTRUCTOR-LED SESSION
Start a live quiz
ASYNCHRONOUS LEARNING
Assign homework
25 questions
Preview
Show answers
  • Question 1
    20 seconds
    Report an issue
    Q.

    Giving objects interactivity is known as ...

    answer choices

    Big data

    Digital security

    internet of things

    None is correct

  • Question 2
    20 seconds
    Report an issue
    Q.

    Managing and analyzing huge volumes of data is called ...

    answer choices

    Interent of things

    Big data

    Pasive security

    Active security

  • Question 3
    20 seconds
    Report an issue
    Q.

    Computer security is a set of measures aimed at protecting

    answer choices

    hardware.

    hardware and software.

    the information and people.

    hardware, software, information and people.

  • Question 4
    20 seconds
    Report an issue
    Q.

    The set of actions aimed at protecting the computer and its content (information) is called ...

    answer choices

    Active security

    Passive security

    People security

    All responses are correct

  • Question 5
    30 seconds
    Report an issue
    Q.

    Programs that hijack other programs to use their rights or to modify their behavior...

    answer choices

    Hijacker

    Virus

    Trojan

    Warm

  • Question 6
    20 seconds
    Report an issue
    Q.

    Malicious Software...

    answer choices

    Virus

    Trojan

    All are correct

    Warm

  • Question 7
    20 seconds
    Report an issue
    Q.

    Malicious program that pretends to overflow the system memory by reproducing itself is called ...

    answer choices

    Virus

    Worm.

    Trojan

    All are correct

  • Question 8
    20 seconds
    Report an issue
    Q.

    The software that is in charge of obtaining and memorizing the keystrokes made on a keyboard is called ...

    answer choices

    spyware

    keylogger

    adware

    Hijacker

  • Question 9
    20 seconds
    Report an issue
    Q.

    Viruses housed in seemingly harmless elements are called...

    answer choices

    adware

    hijacker

    spyware

    trojan

  • Question 10
    20 seconds
    Report an issue
    Q.

    Advertising included in programs that show it after installed...

    answer choices

    Keylogger.

    Virus.

    Adware

    None are correct.

  • Question 11
    30 seconds
    Report an issue
    Q.

    A hacker is...

    answer choices

    a computer expert with malicious intent.

    someone who introduces viruses to my computer

    a computer expert who do not have to pretend to cause harm.

    All answers are wrong.

  • Question 12
    20 seconds
    Report an issue
    Q.

    Redirect a domain name to a different machine, so that the user who enters a URL accesses the attacker's web page...

    answer choices

    Phising.

    Pharming.

    Cracking.

    None is correct.

  • Question 13
    30 seconds
    Report an issue
    Q.

    Computer expert dedicated to changing the way a commercial program works to pirate them.

    answer choices

    Hackers

    Hijackers

    Crackers

    Rackers

  • Question 14
    30 seconds
    Report an issue
    Q.

    Cookies are...

    answer choices

    text files that are stored on the computer through the browser when we visit a web page.

    virus.

    different types of hacker.

    All answers are false.

  • Question 15
    20 seconds
    Report an issue
    Q.

    Company-initiated email chains to collect the email addresses of many users and then do mailings...

    answer choices

    pharming.

    hoaxes.

    phising.

    crackers.

  • Question 16
    30 seconds
    Report an issue
    Q.

    The CAPTCHA is...

    answer choices

    a security system.

    used so that access to the page or account is carried out only by human beings.

    sometimes quite annoying and difficult to decode.

    Todas las respuestas son correctas

  • Question 17
    30 seconds
    Report an issue
    Q.

    MINIMIZE DAMAGE is...

    answer choices

    active security.

    malware

    passive security.

    None is correct.

  • Question 18
    20 seconds
    Report an issue
    Q.


    Among the dangers that we face on the Internet, we can mention:

    answer choices

    Involuntary access to illegal or harmful information.

    Phishing, theft, and scams.

    Loss of privacy and / or damage to our image, in addition to cyberbullying.

    All of them are correct.

  • Question 19
    30 seconds
    Report an issue
    Q.

    In some social networks it is not possible to delete the data that we have entered in them:

    answer choices

    True, but only if you are a minor.

    True, it is specified in the conditions of use and privacy policy of the social network.

    False.

    True, but it happens on all social networks.

  • Question 20
    30 seconds
    Report an issue
    Q.

    Pages with a secure cryptographic protocol have the ...

    answer choices

    HTPP

    HTPPS

    TCP/IP

    IP4

  • Question 21
    30 seconds
    Report an issue
    Q.

    To use strong passwords is a good advice:

    answer choices

    True

    False

  • Question 22
    30 seconds
    Report an issue
    Q.

    A type of malware installs without user permission...

    answer choices

    trojan.

    hijacker.

    spam.

    virus.

  • Question 23
    30 seconds
    Report an issue
    Q.

    E-mails that flood the network in order to advertise products, sometimes of dubious legality...

    answer choices

    Cookies

    Hijack

    SPAM

    All answers are false.

  • Question 24
    30 seconds
    Report an issue
    Q.

    A correct advice is do not follow unknown people on the networks, and do not accept them either:

    answer choices

    True.

    False.

  • Question 25
    30 seconds
    Report an issue
    Q.

    You can fill out forms that promise to give you a prize with personal data with total security:

    answer choices

    True.

    False.

Report an issue
Why show ads?
Report Ad
Lessonsnew
Enter Code