A Level Computer Security Quiz 1

15 Questions

Quiz Description

In this computer science quiz, we shall be going through some important concepts on computer security such as encryption, Hypertext Transfer Protocol Secure (HTTPS), the various types of malware (Trojan Horse, Virus, Worm, etc), the uses of malware, and so on. You won’t want to miss out on this.

Computer security refers to the protection of computer systems from unauthorized usage, theft, and harm. Similarly, computer hardware is protected in the same way as other sensitive equipment, making use of doors and locks, alarms, or serial numbers. An example of a serious security issue is the theft of data such as of military details or secrets from government computers. Nowadays our mobile phones are being equipped with a lot of security technologies. For example, some phones make use of a fingerprint sensor that requires the owner’s fingerprint before access is given. Below are some tips for password-protected accounts or devices:

- Make use of at least 10 characters

- Avoid using common words, names, or dates. combine letters, symbols, and numbers.

- Avoid using the same password for several accounts.

- Do not share passwords.

- Keep the password away from plain sight.

By now you should have understood the importance of computer security. If you are willing to know more about it, answer the following questions. Good luck as you solve the quiz

1:

___________ ensures the integrity and security of data that are passing over a network.


Correct
  • 1:
    Firewall
  • 2:
    Antivirus
  • 3:
    Pentesting Tools
  • 4:
    Network-security protocols
2:

Which of the following is not a strong security protocol?


Correct
  • 1:
    HTTPS
  • 2:
    SSL
  • 3:
    SMTP
  • 4:
    SFTP
3:

__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?


Correct
  • 1:
    security policies
  • 2:
    Protocols
  • 3:
    Network algorithms
  • 4:
    Wireless network
4:

HTTPS is abbreviated as _________


Correct
  • 1:
    Hypertexts Transfer Protocol Secured
  • 2:
    Secured Hyper Text Transfer Protocol
  • 3:
    Hyperlinked Text Transfer Protocol Secured
  • 4:
    Hyper Text Transfer Protocol Secure
5:

S/MIME is abbreviated as __________________


Correct
  • 1:
    Secure/Multimedia Internet Mailing Extensions
  • 2:
    Secure/Multipurpose Internet Mailing Extensions
  • 3:
    Secure/Multimedia Internet Mail Extensions
  • 4:
    Secure/Multipurpose Internet Mail Extensions
6:

Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.


Correct
  • 1:
    Trojan Horse
  • 2:
    Bots
  • 3:
    Virus
  • 4:
    Worm
7:

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____


Correct
  • 1:
    Phishing
  • 2:
    Exploits
  • 3:
    Eavesdropping
  • 4:
    Scams
8:

What is Spyware?


Correct
  • 1:
    Spyware is a type of malware installed on computers that collects information about users without their knowledge
  • 2:
    The presence of spyware is typically hidden from the user and can be difficult to detect
  • 3:
    Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
  • 4:
    All of the above
9:

What are the uses of Malware?


Correct
  • 1:
    Many early infectious programs, including the first Internet Worm, were written as experiments or pranks
  • 2:
    Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general
  • 3:
    Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others
  • 4:
    All of these
10:

In public key cryptosystem _____ keys are used for encryption and decryption.


Correct
  • 1:
    Same
  • 2:
    Different
  • 3:
    Encryption Keys
  • 4:
    None of the mentioned
11:

Pretty good privacy program is used for


Correct
  • 1:
    Electronic mails
  • 2:
    File encryption
  • 3:
    Electronic mails & File encryption
  • 4:
    None of the mentioned
12:

Which are called the block ciphers?


Correct
  • 1:
    IDEA
  • 2:
    Triple-DES
  • 3:
    CAST
  • 4:
    All of the mentioned
13:

The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.


Correct
  • 1:
    Artificial Intelligence
  • 2:
    ML
  • 3:
    Network Security
  • 4:
    IT
14:

An algorithm in encryption is called ______


Correct
  • 1:
    Algorithm
  • 2:
    Procedure
  • 3:
    Cipher
  • 4:
    Module
15:

The information that gets transformed in encryption is _________


Correct
  • 1:
    Plain text
  • 2:
    Parallel text
  • 3:
    Encrypted text
  • 4:
    Decrypted text

Feature Image

A Level Computer Security Quiz 1