Computer & Internet/Network Security

31 Questions | Total Attempts: 2558

SettingsSettingsSettings
Please wait...
Computer Network Quizzes & Trivia

This quiz will test (as well as measure) your knowledge on computer and network/internet security. Some questions only require basic knowledge of security, while other questions require a bit more knowledge. How much do you know. . . Or don't you know? Find out.


Questions and Answers
  • 1. 
    You can get a virus just by opening and reading your email.
  • 2. 
    Which of the following is most likely to send spam emails from your computer?
    • A. 

      Trojan

    • B. 

      Worm

    • C. 

      Virus

    • D. 

      Spyware

    • E. 

      Adware

  • 3. 
    Which of the following is most likely to steal your identity?
    • A. 

      Trojan

    • B. 

      Worm

    • C. 

      Virus

    • D. 

      Spyware

    • E. 

      Adware

  • 4. 
    Which of the following is less likely to be detected with standard antivirus software?
    • A. 

      Trojan

    • B. 

      Worm

    • C. 

      Virus

    • D. 

      Spyware

    • E. 

      Adware

  • 5. 
    DoS attacks cannot be launched against routers.
    • A. 

      True

    • B. 

      False

  • 6. 
    Auditing is used to secure the network and systems on your network.
    • A. 

      True

    • B. 

      False

  • 7. 
    This is a series of messages sent by someone attempting to break into a computer to learn which network services the computer provides.
    • A. 

      Bit robbing

    • B. 

      Jabber

    • C. 

      Port scan

    • D. 

      Service profile identifier

  • 8. 
    Which of the following network operating system logon restrictions is most likely to stop a hacker who is attempting to discover someone's password through a brute force or dictionary attack?
    • A. 

      Total time logged on

    • B. 

      Time of day

    • C. 

      Period of time after which a password expires

    • D. 

      Number of unsuccessful logon attempts

  • 9. 
    Deliberate software attacks are referred to as:
    • A. 

      Malware

    • B. 

      Malicious code

    • C. 

      Malicious software

    • D. 

      All of the above

  • 10. 
    What IDS identifies intrusions based on a preset database that identifies known attack signatures?
    • A. 

      Host Based IDS

    • B. 

      Behavior Based IDS

    • C. 

      Knowledge Based IDS

    • D. 

      Network Based IDS

  • 11. 
    What port does secure HTTP use?
    • A. 

      1701

    • B. 

      1512

    • C. 

      443

    • D. 

      80

  • 12. 
    DoS is a
    • A. 

      Disk operating system

    • B. 

      Denial of service attack

    • C. 

      Detected on-going service

  • 13. 
    Security updates are needed to:
    • A. 

      Improve flaws in installed programs and operating systems to resolve vulnerabilities

    • B. 

      Improve program design and functionality

    • C. 

      Make programs easier to use

    • D. 

      To boost vendor’s profits

  • 14. 
    What is the main problem of a modern antivirus?
    • A. 

      High price and the absence of free telephone support

    • B. 

      False positives

    • C. 

      Dependence on antivirus signatures

    • D. 

      High memory and cpu

  • 15. 
    Which of the following commands typed in the “RUN” menu in Windows will NOT help you find out and configure which programs are allowed to be auto-started on a system?
    • A. 

      “services.msc”

    • B. 

      “IPconfig/all”

    • C. 

      “regedit”

    • D. 

      “msconfig”

  • 16. 
    What is a hash?
    • A. 

      An encrypted value

    • B. 

      A decryption key

    • C. 

      Code used to compress data

  • 17. 
    What does SSL stand for?
    • A. 

      Secret Service Logarithm

    • B. 

      Systematic Security Level

    • C. 

      Secure Sockets Layer

  • 18. 
    • A. 

      IDS

    • B. 

      Firewall

    • C. 

      Honeypot

    • D. 

      CT decoy

  • 19. 
    I use a Mac therefore I’m not exposed to security threats.
    • A. 

      True

    • B. 

      False

  • 20. 
    __________ is a method used by firewalls to filter and block unauthorized traffic.
    • A. 

      Heuristic Scanning

    • B. 

      Stateful/Packet Inspection

    • C. 

      Intrusion Detection

    • D. 

      Active Scripting

  • 21. 
    A hardware firewall is just a (n) ________ running on a dedicated piece of hardware or specialized device.
    • A. 

      Software Firewall

    • B. 

      Intrusion Detection System

    • C. 

      Router

    • D. 

      Switch

  • 22. 
    A system that monitors traffic into and out of a network and automatically alerts you when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n)
    • A. 

      IDS

    • B. 

      Firewall

    • C. 

      Router

    • D. 

      Antivirus

    • E. 

      None of the above

  • 23. 
    Zone Alarm is an example of a ________ firewall.
    • A. 

      Personal

    • B. 

      Corporate

    • C. 

      IDS

    • D. 

      None of the above

  • 24. 
    You need to use multiple antivirus applications on the same computer.
    • A. 

      True

    • B. 

      False

  • 25. 
    You need to update your antivirus definition files regularly.
    • A. 

      True

    • B. 

      False