This document contains a 25 question quiz about cybersecurity concepts. The questions cover topics like types of malware, security implementation steps, encryption techniques, and how to securely use email and browse the internet. For each question, there are 3 answer options to choose from.
This document contains a 25 question quiz about cybersecurity concepts. The questions cover topics like types of malware, security implementation steps, encryption techniques, and how to securely use email and browse the internet. For each question, there are 3 answer options to choose from.
This document contains a 25 question quiz about cybersecurity concepts. The questions cover topics like types of malware, security implementation steps, encryption techniques, and how to securely use email and browse the internet. For each question, there are 3 answer options to choose from.
This document contains a 25 question quiz about cybersecurity concepts. The questions cover topics like types of malware, security implementation steps, encryption techniques, and how to securely use email and browse the internet. For each question, there are 3 answer options to choose from.
1) The installation of an antivirus refers to which step of the security
implementation a) Reaction b) Precaution c) Maintenance Answers 2) What is a zombie machine? a) a machine that executes the instructions of another machine b) a machine that has the symptoms of malware infection. c) a machine on which a zombie game is played Answers 3) The process that accurately ensures that the sender of a message is who he claims to be is called: a) Non-repudiation b) Confidentiality c) Authenticity Answers 4) The system flaws that could not be fixed are: a) vulnerabilities b) threats c) zero days Answers 5) A malicious program that allows you to open a port on a machine is called: a) a worm b) a rootkit c) a backdoor Answers 6) A program that looks good but hides a lot of malware in it is: a) virus b) trojan c) spyware Answers 7) What are the threats related to phones? a) bluesnarfing b) phishing c) Grooming d) Eavesdropping Answers 8) Total virus is a tool for analysis: a) systems b) links c) attachments Answers 9) The technique of modifying the source code of a site before putting it back on the Internet is called: a) Reverse engineering b) Phishing c) Spoofing Answers 10) To secure an operating system, it is recommended to: a) Disable the guest account b) Use a standard account c) Privilege escalation Answers 11) A secure site can be recognized from: a) padlock, green bar and Https b) Https Everywhere c) Malwarebytes Answers 12) Associate each protocol with its port a) SMTP b) 80 c) 25 d) HTTPS e) 23 f) 443 g) Telnet h) http Answers 13) Sending unwanted messages is called a) spamming b) e-mail c) cookies Answers 14) What is the certificate that HTTPS sites use a) SSL b) SMTP c) SQL Answers 15) What is a cookie? a) it is spyware b) it is a small cake c) it is a program that records the user's preferences Answers 16) The art of convincing a person to obtain their personal information is: a) Keylogger b) Social engineering c) Ransomware Answers 17) The attack which consists in intercepting, stealing and modifying the information of a mobile communication is called : a) Bluesnarfing b) Man In The Middle c) Eavesdropping Answers 18) To encrypt her keyboard entries, Maria must install: a) Keyscramble b) Keylogger c) Keystroke Answers 19) an information is: a) a data b) a publication c) data that has meaning Answers 20) The part of the email that contains the source address, destination address, subject, location, time, ip address is called: a) Header b) Body c) Signature Answers 21) The tool that allows you to block spam is: a) Spamfighter b) Lockbin c) Tor Answers 22) The type of encryption that allows you to use a public key and a private key is: a) Symmetric encryption b) Robust encryption c) Asymmetric encryption Answers 23) To secure your email account, it is recommended to configure: a) double authentication b) antivirus software c) metadata Answers 24) To keep children safe on the Internet, we must: a) configure the parental control b) prohibit a child from using the Internet c) install a child navigator Answers 25) The command that allows to see the open ports is: a) Ping b) Ipconfig c) Netstat Answers