In this computer science quiz, we shall be going through some important concepts on computer security such as encryption, Hypertext Transfer Protocol Secure (HTTPS), the various types of malware (Trojan Horse, Virus, Worm, etc), the uses of malware, and so on. You won’t want to miss out on this.
Computer security refers to the protection of computer systems from unauthorized usage, theft, and harm. Similarly, computer hardware is protected in the same way as other sensitive equipment, making use of doors and locks, alarms, or serial numbers. An example of a serious security issue is the theft of data such as of military details or secrets from government computers. Nowadays our mobile phones are being equipped with a lot of security technologies. For example, some phones make use of a fingerprint sensor that requires the owner’s fingerprint before access is given. Below are some tips for password-protected accounts or devices:
- Make use of at least 10 characters
- Avoid using common words, names, or dates. combine letters, symbols, and numbers.
- Avoid using the same password for several accounts.
- Do not share passwords.
- Keep the password away from plain sight.
By now you should have understood the importance of computer security. If you are willing to know more about it, answer the following questions. Good luck as you solve the quiz.
___________ ensures the integrity and security of data that are passing over a network.
Which of the following is not a strong security protocol?
__________ is a set of conventions & rules set for communicating two or more devices residing in the same network?
HTTPS is abbreviated as _________
S/MIME is abbreviated as __________________
Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
What is Spyware?
What are the uses of Malware?
In public key cryptosystem _____ keys are used for encryption and decryption.
Pretty good privacy program is used for
Which are called the block ciphers?
The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
An algorithm in encryption is called ______
The information that gets transformed in encryption is _________