Topics
Products
Follow Us:

Internet Security Questions and Answers (Q&A)

John Smith
Answered: Jul 08, 2020
True

If you save your password on a public computer the next person to use that computer may access your accounts. This might also apply to your home computer or laptop; if curious siblings...Read More

1 Answer

461 views
John Smith
Answered: Jul 08, 2020
123456

According to recent analysis 123456 is the most commonly used password[1], however; these passwords all appear on Twitters list of 370 banned passwords[2] and should be avoided at...Read More

2 Answers

413 views
John Smith
Answered: Jul 08, 2020
False

Password hints and reminders can help to jog your memory and help to avoid creating another password. If you can create your own password hint make sure it only makes sense to...Read More

2 Answers

355 views
John Smith
Answered: Jul 08, 2020
All of the above-all of these techniques can be used to create a strong password. mnemonics can be used to make your password easy to remember (e.g. condense a rude phrase or a funny joke into a...Read More

2 Answers

335 views
Vadnaisk
Answered: Jul 08, 2020
A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target...Read More

1 Answer

322 views
John Smith
Answered: Jul 08, 2020
As long as possible-contrary to popular belief, a lengthy password can be as secure, if not more, than a complex password. A lengthy password should be used to increase the amount of time it could...Read More

1 Answer

254 views
John Smith
Answered: Jul 08, 2020
Them(12)[email protected] a memorable phrase and using a mixture of special characters, alternate spellings, and varying cases (upper and lower case letters) in a memorable way is an...Read More

1 Answer

241 views
SecurityQuizmaster
Answered: Jul 08, 2020
It depends!

There are variables other than length that determine how quickly a password can be cracked. The types of characters used, whether or not the password is based on a common word...Read More

1 Answer

229 views
John Smith
Answered: Jul 08, 2020
Using manipulation to deceive people that you are someone you are not to gain access to the information you need

The correct answer is c). Social Engineering uses influence and persuasion...Read More

1 Answer

227 views
John Smith
Answered: Jul 08, 2020
It maintains a state table
It functions on the network layer

The Stateful inspection firewall, monitors connection status based on the state table. It functions on the network layer...Read More

1 Answer

218 views
John Smith
Answered: Jul 08, 2020
Keep shopping, banking, using every account about online activity.

1 Answer

218 views
Islas
Answered: Nov 02, 2017
In short, “OTP” stands for “One True Pairing.” It's used in fandoms to describe any given participant's favorite couple — or couples, because, perhaps contrary to...Read More

1 Answer

215 views
Teleleng
Answered: Jul 08, 2020
Tell your family and friends about it, so they could be aware of it.

1 Answer

214 views
John Smith
Answered: Jul 08, 2020
Remove questionable Facebook photos and posts
2. Change my online profile name if it isn t professional
3. List only appropriate extracurricular activities

1 Answer

207 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.