1.
What is the most common delivery method for viruses?
Correct Answer
A. Email
Explanation
Although viruses can be delivered by any of the other methods, opening an email attachment is the most common delivery of viruses.
2.
Which of the following would be the best password?
Correct Answer
B. Iw2c^tILV
Explanation
A secure password must be made up of random characters but easy to remember. Iw2c^tILV can easily be remembered by the phrase "I went to see Carrot Top in Las Vegas.
3.
Your sister sends you an e-mail at work with a screen saver she says you would love. What should you do? (Select all that apply)
Correct Answer
D. Delete the message.
Explanation
This one has four big risks:
1. Some screen savers contain viruses or other malicious programs, so just in general, it's risky to put unknown or unsolicited programs or software on your computer.
2. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don't click on it.
3. Email addresses can be faked, so just because the email says it is from someone you know, you can't be certain of this without checking.
4. Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.
4.
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply)
Correct Answer
B. Contact the IT Helpdesk immediately.
Explanation
This is definitely suspicious. Immediately report the problem to the IT Help Desk.
Also, since it seems possible that someone is controlling the computer remotely, it is best if you can disconnect the computer from the network until help arrives. If possible, do not turn off the computer.
5.
When receiving an email from an unknown contact that has an attachment, you should:
Correct Answer
B. Delete the email
Explanation
You should never open attachments that you are not expecting.
6.
Which of the following is a proper use of email?
Correct Answer
A. Never email personal information
Explanation
Sending personal information through email is not a proper use because it can potentially compromise the security and privacy of the information. Email is not a secure method of communication, and personal information such as social security numbers, credit card details, or passwords should never be shared through email. It is important to use more secure methods, such as encrypted messaging or secure file sharing, when transmitting personal information.
7.
You receive an e-mail with an attachment from "I.T. Security." The e-mail says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (Select all that apply)
Correct Answer(s)
D. Delete the message from the unknown source.
E. Contact the IT Help Desk and ask about the email.
ExplanationAttachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment is very risky.
If you can tell that this is spam, delete the E-mail message. If you are unsure about whether you should open the attachment, contact the IT Help Desk
[email protected] for further instructions. As a general rule, don't open, reply to, or forward suspicious e-mails or attachments
8.
Which of the following is a good way to create a password? (Select all that apply)
Correct Answer(s)
C. A combination of upper and lowercase letters mixed with numbers and symbols
E. Using a password generator
Explanation
A secure password is at least eight characters long.
Does not contain your user name, real name, or company name.
Does not contain a complete word.
Is significantly different from previous passwords.
Contains characters from each of the following four categories:
Uppercase letters
Lowercase letters
Numbers
Symbols
9.
Instant Messaging is safer than regular email.
Correct Answer
B. False
Explanation
Viruses can be spread through instant messaging
10.
If a co-worker sends you an email with a link to a website and a subject line that reads "You have to see this...soooo funny" (Select all that apply)
Correct Answer(s)
B. Delete the email
C. Forward the email to your personal email, open it at home and hope that it does not contain a virus
D. Ask Donna to stop it
Explanation
Never use your Murnane email account to send or receive non business related emails as viruses can be spread through web links, pictures, videos ect.
11.
Who amongst the following is known for computer virus defense techniques?
Correct Answer
D. Fred Cohen
Explanation
Fred Cohen is known for his work in computer virus defense techniques. He is a computer scientist and is credited with coining the term "computer virus." Cohen conducted groundbreaking research on computer viruses in the 1980s and developed early techniques for detecting and defending against them. His work laid the foundation for modern antivirus software and helped establish the field of computer security.
12.
Who coined the term "Virus"?
Correct Answer
A. Len Adleman
Explanation
Len Adleman is credited with coining the term "Virus." He is an American computer scientist who, along with his colleagues, developed the RSA encryption algorithm. Adleman used the term "Virus" to describe self-replicating computer programs that can infect other programs and disrupt computer systems. His work has been influential in the field of computer security and cryptography.
13.
Which of the following is a type of computer threat?
Correct Answer
C. Dos Attack
Explanation
A DoS (Denial of Service) attack is a type of computer threat where an attacker overwhelms a target system with a flood of illegitimate requests, rendering it unable to respond to legitimate requests. This can lead to a disruption of services, loss of data, and potential financial or reputational damage. Unlike phishing, which involves tricking individuals into revealing sensitive information, and soliciting, which refers to requesting or seeking something, a DoS attack directly targets the availability and functionality of a computer system. Therefore, the correct answer is Dos Attack.
14.
____________________ is a special software designed to detect computer viruses and avoid them from the system.
Correct Answer
D. Antivirus
Explanation
An antivirus is a specialized software that is specifically designed to detect and prevent computer viruses from infecting a system. It scans files and programs, identifies any potential threats, and takes necessary actions to remove or quarantine them. It provides real-time protection by continuously monitoring the system for any suspicious activities or malware attacks. By regularly updating virus definitions, an antivirus ensures that it can effectively detect and neutralize the latest threats. Therefore, an antivirus is an essential tool for maintaining the security and integrity of a computer system.
15.
Which of the following is an example of an antivirus program?
Correct Answer
D. All of the above
Explanation
All of the options listed, namely McAfee, Quick Heal, and Kaspersky, are examples of antivirus programs. Each of these programs is designed to detect, prevent, and remove malicious software or malware from a computer system. They provide real-time protection, regular system scans, and updates to ensure the security of the system. Therefore, the correct answer is "All of the above."