Internet Security Quiz: Awareness Test!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mesa1bhuynh
M
Mesa1bhuynh
Community Contributor
Quizzes Created: 1 | Total Attempts: 6,693
Questions: 10 | Attempts: 6,699

SettingsSettingsSettings
Internet Security Quiz: Awareness Test! - Quiz

.


Questions and Answers
  • 1. 

    This technique tries to take information from the user, but the user actively gave the information. Common things taken are credit cards, usernames, passwords, and home addresses.

    • A.

      Phishing

    • B.

      Scam

    • C.

      Spyware

    • D.

      Fishing

    Correct Answer
    A. Phishing
    Explanation
    Phishing is a technique where attackers try to obtain sensitive information from users by pretending to be a trustworthy entity. They often use deceptive emails, messages, or websites that appear legitimate to trick users into revealing personal information such as credit card details, usernames, passwords, and home addresses. The user willingly provides this information, unaware that they are being scammed.

    Rate this question:

  • 2. 

    How would you be able to protect yourself from phishing?

    • A.

      By setting easy passwords

    • B.

      Get an Anti-Virus Program

    • C.

      Change Passwords Every 4-6 months

    • D.

      B&C

    Correct Answer
    D. B&C
    Explanation
    To protect yourself from phishing, you can take the following measures: Get an Anti-Virus Program to detect and block any malicious software or links that may be present in phishing emails or websites. Additionally, changing passwords every 4-6 months helps prevent unauthorized access to your accounts, reducing the risk of falling victim to phishing attacks.

    Rate this question:

  • 3. 

    What clue is certain that you may have spyware on your computer which can cause your performance of the computer to be slower due to many?

    • A.

      Malware

    • B.

      Trojans

    • C.

      Popups

    • D.

      I don't know.

    Correct Answer
    C. Popups
    Explanation
    Popups are a certain clue that you may have spyware on your computer. Spyware often generates unwanted popups, which can significantly slow down the performance of the computer. These popups can appear randomly and frequently, disrupting the user's experience and indicating the presence of malicious software.

    Rate this question:

  • 4. 

    How does spyware infect a computer?

    • A.

      Popups

    • B.

      Theft of Personal Info

    • C.

      Recording Web Info

    • D.

      All the above

    Correct Answer
    D. All the above
    Explanation
    Spyware can infect a computer through various means. Popups can be used to trick users into clicking on malicious links or downloading infected files. Theft of personal information refers to spyware collecting sensitive data such as passwords, credit card details, or social security numbers without the user's knowledge. Recording web information involves spyware monitoring and logging the user's browsing habits, including websites visited and search queries. Therefore, all the options mentioned above can be ways in which spyware infects a computer.

    Rate this question:

  • 5. 

    How does identity theft cause problems for online users?

    • A.

      Steals social security

    • B.

      Locates where you live and all information

    • C.

      Steals bank information

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Identity theft causes problems for online users because it involves stealing social security numbers, locating personal information such as address, and stealing bank information. These actions can lead to financial loss, unauthorized access to personal accounts, and potential harm to one's reputation and privacy. It is important for online users to take precautions and safeguard their personal information to prevent falling victim to identity theft.

    Rate this question:

  • 6. 

    Why is identity theft  something hackers usually go for?

    • A.

      Personal Information

    • B.

      Being able to have another name.

    • C.

      Send them emails.

    • D.

      Take their victim's address for future use.

    Correct Answer
    A. Personal Information
    Explanation
    Hackers usually go for identity theft because personal information is valuable and can be used for various malicious activities. By obtaining someone's personal information, hackers can impersonate them, gain unauthorized access to their accounts, commit financial fraud, or even sell the information on the dark web. Personal information such as social security numbers, bank account details, and addresses can provide hackers with the means to carry out their illegal activities and exploit their victims. Therefore, identity theft is a common objective for hackers due to the potential financial gain and the ability to cause significant harm to individuals.

    Rate this question:

  • 7. 

    Josh has been messaging a stranger online. They have been talking for a couple of weeks now, and the stranger want's Josh's email. Trusting him, Josh gives his email to the stranger. After, the stranger cuts off all conversations between Josh, and Josh sees that he has thousands of emails in his inbox from different companies, people, and junk. What is the thousands of emails ,because of the messaging, a form of what? The stranger's name is Kevin.

    • A.

      Spam through talking

    • B.

      Spam through messaging

    • C.

      Spam through email

    • D.

      Theft

    Correct Answer
    C. Spam through email
    Explanation
    The correct answer is "Spam through email" because after giving his email to the stranger, Josh received thousands of emails from different sources, indicating that his email address was used to send unsolicited and unwanted messages, which is commonly referred to as spam.

    Rate this question:

  • 8. 

    Spam causes emails to be victims of tons and tons of junk mail. With that said, that is spam through email. How are there other ways spam can give tons and tons of junk?

    • A.

      Spam through forums

    • B.

      Spam through messaging

    • C.

      Spam through online gaming

    • D.

      All the above

    Correct Answer
    D. All the above
    Explanation
    Spam can give tons and tons of junk through forums, messaging, and online gaming in addition to email. These methods involve sending unsolicited and unwanted messages or advertisements to a large number of users, overwhelming them with irrelevant content. This can disrupt the normal functioning of these platforms and cause inconvenience to users. Therefore, spam can be a problem across various online channels, not just limited to email.

    Rate this question:

  • 9. 

    This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?

    • A.

      Spam

    • B.

      Malware

    • C.

      Phishing

    • D.

      Spyware

    Correct Answer
    D. Spyware
    Explanation
    Spyware is a type of software that is installed on computers without the user's consent and collects small pieces of information from users. It is designed to operate stealthily, making it difficult to detect. Unlike spam, which refers to unsolicited and unwanted emails, malware, which encompasses various types of malicious software, and phishing, which involves tricking users into revealing sensitive information, spyware specifically focuses on gathering user data without their knowledge.

    Rate this question:

  • 10. 

    Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?

    • A.

      Close window

    • B.

      Never use your computer

    • C.

      Anti-Virus Program

    • D.

      Turn Off Computer

    Correct Answer
    C. Anti-Virus Program
    Explanation
    An anti-virus program is a software designed to detect, prevent, and remove malware from a computer system. By regularly scanning the system, it can identify and eliminate any malicious programs that may be gathering sensitive information and compromising privacy. Therefore, having an anti-virus program installed and regularly updated on your computer can provide general protection against malware and help safeguard your privacy.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 29, 2011
    Quiz Created by
    Mesa1bhuynh
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.