Quiz On Firewall, Internet Security And Anti Virus! Trivia Questions Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mrrios25
M
Mrrios25
Community Contributor
Quizzes Created: 1 | Total Attempts: 456
Questions: 20 | Attempts: 456

SettingsSettingsSettings
Quiz On Firewall, Internet Security And Anti Virus! Trivia Questions Quiz - Quiz

This is a quiz that tests firewall, internet security and anti-virus. Firewall and antivirus are the mechanisms to provide the security to our systems. The major difference between a firewall and antivirus is that a Firewall acts as a barrier for the incoming traffic to the system. Conversely while Antivirus protects against the internal attacks like malicious files. Test your knowledge on these three fields by taking this exciting quiz.


Questions and Answers
  • 1. 

    All of the following are part of securing a Windows computer except:

    • A.

      Limiting use of admin accounts

    • B.

      Setting up individual accounts

    • C.

      Setting strong passwords

    • D.

      Shutting down the computer every night

    Correct Answer
    D. Shutting down the computer every night
    Explanation
    Shutting down the computer every night is not directly related to securing a Windows computer. While it is good practice to shut down the computer when not in use to conserve energy and prolong the lifespan of the hardware, it does not directly contribute to the security of the computer. The other options listed, such as limiting the use of admin accounts, setting up individual accounts, and setting strong passwords, are all important security measures that help protect the computer from unauthorized access and potential security breaches.

    Rate this question:

  • 2. 

    It is not necessary to install a personal firewall.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Installing a personal firewall is necessary for ensuring the security of personal devices and networks. A personal firewall acts as a barrier between the device and the internet, monitoring incoming and outgoing network traffic and blocking any unauthorized access or malicious activities. It helps protect against various threats such as hackers, malware, and unauthorized data transfers. Without a personal firewall, devices are more vulnerable to attacks and can be easily compromised. Therefore, the correct answer is False, indicating that it is necessary to install a personal firewall.

    Rate this question:

  • 3. 

    Once you install Antivirus or anti-adware software you don’t need to worry about it anymore.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Installing antivirus or anti-adware software does not mean that you no longer need to worry about it. While these software can provide protection against viruses and adware, they still require regular updates and scans to ensure their effectiveness. New threats are constantly emerging, and without regular updates, the software may not be able to detect or remove them. Additionally, user behavior and safe internet practices also play a crucial role in maintaining security. Therefore, it is important to remain vigilant and take necessary precautions even after installing antivirus or anti-adware software.

    Rate this question:

  • 4. 

    In order to “plug up” any security holes in your Windows Operating System always.

    • A.

      Keep your computer in a warm safe place

    • B.

      Keep some Bondo handy

    • C.

      Keep Windows updates current

    • D.

      Activate Remote Desktop

    Correct Answer
    C. Keep Windows updates current
    Explanation
    Keeping Windows updates current is important for plugging up security holes in the Windows Operating System. Windows updates often include patches and fixes for known vulnerabilities, which helps to protect the system from potential threats. By regularly installing these updates, users can ensure that their operating system is up to date and better equipped to defend against security breaches.

    Rate this question:

  • 5. 

    There are settings in Internet Explorer to make it more secure.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Internet Explorer has various settings that can be adjusted to enhance its security. These settings include options to enable/disable security features, manage pop-up blockers, control cookie handling, and configure security zones. By customizing these settings, users can strengthen the security of their browsing experience and protect against potential threats such as malware, phishing, and unauthorized access to personal information. Therefore, the statement "There are settings in Internet Explorer to make it more secure" is true.

    Rate this question:

  • 6. 

    One way to try to avoid malicious attacks is to use alternatives to Internet Explorer and Outlook or Outlook Express such as Firefox or Eudora. Why?

    • A.

      Firefox and Eudora are less popular therefore not as targeted

    • B.

      Firefox and Eudora are written by better programmers

    • C.

      Firefox and Eudora are more difficult to attack

    • D.

      All of the above

    Correct Answer
    A. Firefox and Eudora are less popular therefore not as targeted
    Explanation
    Firefox and Eudora are less popular compared to Internet Explorer and Outlook or Outlook Express. Malicious attackers often target widely used software because it offers a larger user base to exploit. By using alternatives like Firefox and Eudora, which are less popular, the chances of being targeted by such attacks decrease. Therefore, using these alternatives can be a way to avoid malicious attacks.

    Rate this question:

  • 7. 

    If you have current antivirus and up-to-date operating system, you can open any email attachments and recklessly go to any website.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Having a current antivirus and up-to-date operating system does not guarantee complete protection against all threats. While it reduces the risk of malware and viruses, it does not eliminate it entirely. Opening any email attachments and visiting any website recklessly can still expose you to potential risks, such as phishing attacks or zero-day exploits. Therefore, it is not advisable to engage in such behavior, even with a current antivirus and up-to-date operating system.

    Rate this question:

  • 8. 

    Data can be encrypted using which of the following:

    • A.

      Antivirus

    • B.

      Software based firewall

    • C.

      Symantec Encryptomagic

    • D.

      Windows Encrypted Files System (EFS)

    Correct Answer
    D. Windows Encrypted Files System (EFS)
    Explanation
    Data can be encrypted using the Windows Encrypted Files System (EFS). EFS is a feature of the Windows operating system that allows users to encrypt files and folders on their computer. This encryption ensures that only authorized users with the correct encryption key can access the data. Antivirus and software-based firewalls are not specifically designed for data encryption, although they play a role in overall data security. Symantec Encryptomagic is not a commonly known or widely used encryption tool.

    Rate this question:

  • 9. 

    It is a good idea to physically protect equipment using which of the following:

    • A.

      Cables that lock down cases

    • B.

      Superglue cases shut so it can’t be opened

    • C.

      Attach an alarm system

    • D.

      Electrically charge it so would be thieves will be “electrified.”

    Correct Answer
    A. Cables that lock down cases
    Explanation
    Physically protecting equipment is important to prevent theft or unauthorized access. One effective way to do this is by using cables that lock down cases. This involves securing the equipment to a fixed object using a cable and lock, making it difficult for thieves to steal or tamper with the equipment. This method provides an added layer of security and ensures that the equipment remains in place and protected.

    Rate this question:

  • 10. 

    Which of the following are Social Engineering techniques used to get personal information?

    • A.

      Phishing

    • B.

      Spamming

    • C.

      Virus Hoaxes

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Phishing, spamming, and virus hoaxes are all examples of social engineering techniques used to obtain personal information. Phishing involves tricking individuals into revealing sensitive information by impersonating a trustworthy entity. Spamming refers to the mass sending of unsolicited messages, often containing malicious links or requests for personal information. Virus hoaxes aim to deceive users into believing they are at risk of a computer virus, prompting them to disclose personal details. Therefore, all three options mentioned in the question are correct social engineering techniques for obtaining personal information.

    Rate this question:

  • 11. 

    Always keep good backups of your data and system state.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to always keep good backups of your data and system state to ensure that you can recover your information in case of any data loss or system failure. Backups help to protect against accidental deletion, hardware failure, software corruption, and other unforeseen events. By regularly backing up your data and system state, you can minimize the risk of losing important information and ensure that you can quickly restore your system to a previous working state if needed.

    Rate this question:

  • 12. 

    It is a good idea to monitor the following within the event log.

    • A.

      Logon failures

    • B.

      Access to files and folders

    • C.

      Changes to startup procedures

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Monitoring logon failures, access to files and folders, and changes to startup procedures within the event log is a good idea because it allows for the detection and investigation of potential security breaches or unauthorized activities. By monitoring logon failures, organizations can identify and respond to any suspicious or unsuccessful login attempts. Monitoring access to files and folders helps ensure that only authorized individuals are accessing sensitive data. Changes to startup procedures can indicate the presence of malware or unauthorized modifications to the system. Therefore, monitoring all of these activities can contribute to maintaining the security and integrity of the system.

    Rate this question:

  • 13. 

    Once you remove the hard drive from the computer, it is unreadable and can be discarded with no worries of data being extracted.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because even if the hard drive is removed from the computer, the data can still be extracted using specialized tools and techniques. Simply discarding the hard drive does not guarantee that the data on it cannot be accessed. It is important to properly wipe or destroy the hard drive to ensure that the data is not recoverable.

    Rate this question:

  • 14. 

    The safest form of authentication to a network is

    • A.

      Strong passwords

    • B.

      Using a domain controller for authentication

    • C.

      Using two domain controllers for authentication

    • D.

      Smart cards, or bio-metric scanners/data

    Correct Answer
    D. Smart cards, or bio-metric scanners/data
    Explanation
    Smart cards, or bio-metric scanners/data, are considered the safest form of authentication to a network. This is because they provide an additional layer of security beyond just passwords. Smart cards are physical devices that store authentication information and require physical possession to access the network. Bio-metric scanners/data, on the other hand, use unique physical characteristics of individuals, such as fingerprints or iris patterns, to verify their identity. Both methods are difficult to replicate or fake, making them highly secure forms of authentication.

    Rate this question:

  • 15. 

    All of the following are malicious software except:

    • A.

      Browser hijackers

    • B.

      Trojan horses

    • C.

      Adware

    • D.

      Spam

    • E.

      They are all malicious software

    Correct Answer
    E. They are all malicious software
    Explanation
    The given answer is incorrect. The question asks for an exception among the listed options, and the correct answer is "Spam." While browser hijackers, Trojan horses, and adware are all types of malicious software, spam refers to unsolicited and often unwanted email messages. Although spam can sometimes contain malicious content or links, it is not classified as a type of software.

    Rate this question:

  • 16. 

    It is critical to always keep your firewall, antivirus, and anti-adware up to date.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Keeping your firewall, antivirus, and anti-adware up to date is critical because it helps protect your computer and network from potential threats, such as viruses, malware, and unauthorized access. Regular updates ensure that your security software has the latest patches and definitions to detect and block new and emerging threats. Neglecting to update these protective measures can leave your system vulnerable to attacks and compromise your data and privacy. Therefore, it is important to always keep your firewall, antivirus, and anti-adware up to date.

    Rate this question:

  • 17. 

    FTP uses the following port:

    • A.

      80

    • B.

      20

    • C.

      21

    • D.

      22

    Correct Answer
    C. 21
    Explanation
    FTP (File Transfer Protocol) uses port 21. This port is specifically designated for FTP control commands and is used to establish a connection between the FTP client and server. The FTP control connection is responsible for sending commands from the client to the server and receiving responses back. Once the control connection is established, data transfer can occur over a separate data connection using a different port. Port 21 is the standard port for FTP, but it can be configured to use a different port if needed.

    Rate this question:

  • 18. 

    SFTP uses the following port:

    • A.

      80

    • B.

      20

    • C.

      21

    • D.

      22

    Correct Answer
    D. 22
    Explanation
    SFTP uses port 22 because it is a secure file transfer protocol that uses SSH (Secure Shell) for authentication and data encryption. Port 22 is the default port for SSH, and SFTP utilizes this port to establish a secure connection between the client and the server for secure file transfers.

    Rate this question:

  • 19. 

    HTTP uses the following port:

    • A.

      80

    • B.

      20

    • C.

      21

    • D.

      22

    Correct Answer
    A. 80
    Explanation
    HTTP (Hypertext Transfer Protocol) uses port 80. Ports are used to establish communication between different applications on a computer network. In the case of HTTP, port 80 is specifically assigned for this protocol. It allows web browsers to connect to web servers and retrieve web pages. By using port 80, HTTP ensures that the data is transmitted correctly between the client (web browser) and the server (web server).

    Rate this question:

  • 20. 

    Remote Desktop uses the following port:

    • A.

      3389

    • B.

      80

    • C.

      21

    • D.

      22

    Correct Answer
    A. 3389
    Explanation
    Remote Desktop uses port 3389 for communication. This port is specifically designated for Remote Desktop Protocol (RDP) connections, allowing users to remotely access and control a computer or server. By using port 3389, Remote Desktop establishes a secure and encrypted connection between the local and remote machines, enabling users to view and interact with the remote desktop as if they were physically present at that location.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 17, 2010
    Quiz Created by
    Mrrios25
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.