Computer & Internet/Network Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Quizbygeohac
Q
Quizbygeohac
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,134
| Attempts: 4,134 | Questions: 30
Please wait...
Question 1 / 31
0 %
0/100
Score 0/100
1.
You need to update your antivirus definition files regularly.

Explanation

Regularly updating antivirus definition files is important because new viruses and malware are constantly being developed. By updating the antivirus definition files, you ensure that your antivirus software has the latest information on these threats, allowing it to effectively detect and remove them from your system. Failing to update the definition files regularly could leave your computer vulnerable to new and emerging threats. Therefore, the statement "You need to update your antivirus definition files regularly" is true.

Submit
Please wait...
About This Quiz
Computer & Internet/Network Security - Quiz

This quiz will test (as well as measure) your knowledge on computer and network/internet security. Some questions only require basic knowledge of security, while other questions require a... see morebit more knowledge. How much do you know. . . Or don't you know? Find out.
see less

2.
Security updates are needed to:

Explanation

Security updates are necessary to improve flaws in installed programs and operating systems in order to resolve vulnerabilities. These updates aim to address any weaknesses or loopholes that may exist in the software, making it less prone to attacks or unauthorized access. By identifying and patching these flaws, the updates enhance the overall security of the system, protecting it from potential threats and ensuring the safety of user data.

Submit
3. Windows updates are not necessary.

Explanation

Windows updates are necessary for several reasons. They provide security patches to protect against new threats and vulnerabilities, fix bugs and issues in the operating system, and improve the overall performance and stability of the system. Regularly updating Windows ensures that the system is up to date with the latest features and enhancements, and helps to keep the system running smoothly. Therefore, the statement that Windows updates are not necessary is false.

Submit
4. Encryption should be considered for internal network traffic as well as external network traffic.

Explanation

Encryption should be considered for both internal and external network traffic because it helps to protect sensitive information from unauthorized access or interception. Internal network traffic may still be vulnerable to attacks from insiders or compromised devices, so encrypting the data ensures that even if it is intercepted, it cannot be read without the proper decryption key. Additionally, encrypting internal traffic helps to maintain confidentiality and integrity within the network, preventing unauthorized users from accessing or tampering with sensitive data. Therefore, encryption should be implemented for both internal and external network traffic to ensure the security of the network.

Submit
5. I use a Mac therefore I’m not exposed to security threats.

Explanation

This statement is false because using a Mac does not guarantee immunity from security threats. While Macs are generally considered to be more secure than Windows PCs due to their smaller market share and built-in security features, they are still vulnerable to malware, phishing attacks, and other security risks. No computer system is completely immune to security threats, and it is important for Mac users to take appropriate precautions such as using strong passwords, keeping software up to date, and using antivirus software.

Submit
6. You need to use multiple antivirus applications on the same computer.

Explanation

Using multiple antivirus applications on the same computer is not recommended as they can conflict with each other and cause performance issues. Having multiple antivirus programs running simultaneously can lead to resource conflicts, slow down the computer, and potentially even create false positives or negatives in detecting threats. It is generally advised to use only one reliable antivirus program to ensure proper protection without any conflicts.

Submit
7.
What does SSL stand for?

Explanation

SSL stands for Secure Sockets Layer. This is a cryptographic protocol that provides secure communication over a network. It ensures that the data transmitted between a web server and a browser remains encrypted and protected from unauthorized access. SSL is commonly used to secure online transactions, such as credit card payments, login credentials, and sensitive information exchange. By encrypting the data, SSL helps to prevent eavesdropping, data tampering, and identity theft.

Submit
8. DoS is a

Explanation

A denial of service attack (DoS) is a type of cyber attack where an attacker overwhelms a system or network with a flood of illegitimate requests, causing it to become unavailable to its intended users. This can be done by exploiting vulnerabilities in the system, such as consuming all available resources or crashing the system. A DoS attack aims to disrupt the normal functioning of a service or website, making it inaccessible to legitimate users.

Submit
9. How should you protect your wireless network?

Explanation

To protect your wireless network, you should implement all of the mentioned measures. Not broadcasting your SSID (Service Set Identifier) makes your network less visible to potential attackers. Using encryption, such as WPA2, ensures that the data transmitted over the network is secure and cannot be easily intercepted. Only allowing known computers to connect to your access point adds an extra layer of security by preventing unauthorized devices from accessing your network. By implementing all of these measures, you can significantly enhance the security of your wireless network.

Submit
10. Encrypting sensitive data on a hard drive means

Explanation

Encrypting sensitive data on a hard drive ensures that it is protected from unauthorized access. By encrypting the data, it becomes unreadable to anyone who does not have the decryption password. This means that only someone who knows the decryption password can successfully decrypt and view the sensitive data. Additionally, the encryption does not restrict the usage of the data, as the authorized user who knows the decryption password can still use the data once it is decrypted.

Submit
11. Deliberate software attacks are referred to as:

Explanation

The correct answer is "All of the above" because deliberate software attacks can be categorized as malware, malicious code, or malicious software. Malware refers to any software designed to harm a computer system, while malicious code specifically refers to harmful instructions or scripts within software. Malicious software encompasses any software created with malicious intent, including both malware and malicious code. Therefore, all three terms are appropriate descriptions for deliberate software attacks.

Submit
12. DoS attacks cannot be launched against routers.

Explanation

DoS (Denial of Service) attacks can indeed be launched against routers. A DoS attack aims to overwhelm a target device or network with a flood of illegitimate requests or traffic, causing it to become unresponsive or crash. Routers, being a critical component of a network infrastructure, are often targeted by hackers to disrupt network connectivity or gain unauthorized access. Different types of DoS attacks, such as TCP/IP attacks, SYN floods, or ICMP floods, can be directed towards routers, exploiting vulnerabilities in their software or overwhelming their processing capabilities. Therefore, the statement that DoS attacks cannot be launched against routers is false.

Submit
13. Which of the following network operating system logon restrictions is most likely to stop a hacker who is attempting to discover someone's password through a brute force or dictionary attack?

Explanation

The number of unsuccessful logon attempts is the most likely restriction to stop a hacker attempting to discover someone's password through brute force or dictionary attack. This restriction would limit the number of attempts a hacker can make before being locked out, making it difficult for them to guess the correct password.

Submit
14. Which of the following commands typed in the “RUN” menu in Windows will NOT help you find out and configure which programs are allowed to be auto-started on a system?

Explanation

The command "IPconfig/all" is used to display the IP configuration settings for all network interfaces on a Windows system. It does not provide any information or configuration options related to auto-started programs.

Submit
15. What is a hash?

Explanation

A hash is a type of encryption that converts data into a fixed-size string of characters. It is used to securely store and transmit sensitive information such as passwords. The encrypted value produced by a hash function is irreversible, meaning it cannot be decrypted to obtain the original data. Therefore, it provides a high level of security and is commonly used in various applications to protect data integrity and ensure authentication.

Submit
16. Which of the following is most likely to steal your identity?

Explanation

Spyware is most likely to steal your identity because it is designed to gather personal information without the user's knowledge or consent. It can track your online activities, capture sensitive data such as passwords and credit card information, and send it to a third party. Unlike viruses or worms, which are mainly focused on causing damage to your computer, spyware specifically targets your personal information for malicious purposes.

Submit
17. This is a series of messages sent by someone attempting to break into a computer to learn which network services the computer provides.

Explanation

A port scan is a technique used by hackers to identify open ports on a computer or network. By sending messages to various ports, the hacker can determine which network services are running on the target computer. This information is valuable for planning further attacks or exploiting vulnerabilities in the system.

Submit
18. A (n) ________ is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems.

Explanation

A honeypot is a computer system that is intentionally designed to attract and deceive hackers or unauthorized users attempting to gain access to other computer systems. It acts as a trap, luring these individuals into interacting with the system while monitoring their activities. The purpose of a honeypot is to gather information about potential threats, study attack techniques, and enhance the security of real systems by diverting malicious activity away from them.

Submit
19. A hardware firewall is just a (n) ________ running on a dedicated piece of hardware or specialized device.

Explanation

A hardware firewall is a type of firewall that is implemented using dedicated hardware or specialized devices. In contrast, a software firewall is a firewall that is implemented using software running on a computer or server. Therefore, the correct answer is "Software Firewall" as it refers to a firewall that is running on a dedicated piece of hardware or specialized device.

Submit
20. What is the main problem of a modern antivirus?

Explanation

The main problem of a modern antivirus is its dependence on antivirus signatures. Antivirus programs rely on signatures to identify known malware and viruses. However, this approach is not effective against new and unknown threats. As cybercriminals constantly create new malware variants, antivirus programs may not be able to detect them without an updated signature database. This limitation makes antivirus programs less reliable in protecting against emerging threats and requires constant updates to stay effective.

Submit
21. __________ is a method used by firewalls to filter and block unauthorized traffic.

Explanation

Stateful/Packet Inspection is a method used by firewalls to filter and block unauthorized traffic. This technique examines the entire network communication session, rather than just individual packets, to determine if the traffic is authorized or not. It keeps track of the state of the connection and uses this information to make decisions about allowing or blocking traffic. This method provides a higher level of security and is more effective in detecting and preventing unauthorized access to a network.

Submit
22. A system that monitors traffic into and out of a network and automatically alerts you when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n)

Explanation

An IDS, or Intrusion Detection System, is a system that monitors network traffic and alerts the user when suspicious traffic patterns are detected. This can indicate a possible unauthorized intrusion attempt. Unlike a firewall or router, which primarily focus on blocking or allowing traffic based on predetermined rules, an IDS is specifically designed to detect and notify about potential intrusions. Antivirus software, on the other hand, is primarily used to detect and remove malware from a system, rather than monitoring network traffic. Therefore, the correct answer is IDS.

Submit
23. Zone Alarm is an example of a ________ firewall.

Explanation

Zone Alarm is an example of a personal firewall. A personal firewall is a type of firewall that is installed on an individual's personal computer or device to protect it from unauthorized access and malicious activities. It provides security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Zone Alarm is a popular personal firewall software that offers features such as intrusion detection, application control, and privacy protection to ensure the safety of personal devices and data.

Submit
24. What port does secure HTTP use?

Explanation

Secure HTTP, also known as HTTPS, uses port 443. This port is specifically designated for secure web communications using the SSL/TLS protocols. By using port 443, HTTPS ensures that the data exchanged between the client and the server is encrypted and secure from unauthorized access. Port 443 is widely used for secure online transactions, banking, and any other activities that require a secure connection over the internet.

Submit
25. Passwords stop an intruder who gains physical access to a computer.


Explanation

Passwords do not stop an intruder who gains physical access to a computer. Once an intruder has physical access to a computer, they can bypass the password protection by various means, such as resetting the password or accessing the computer's files directly. Therefore, passwords alone are not sufficient to protect against intruders who have physical access to a computer.

Submit
26. Auditing is used to secure the network and systems on your network.


Explanation

Auditing is not used to secure the network and systems on your network. Auditing is a process of examining and analyzing various aspects of a network or system to ensure compliance with established policies and procedures. It involves reviewing logs, records, and other data to identify any vulnerabilities or potential security risks. While auditing can help identify security issues, it is not the primary method for securing the network and systems. Other security measures such as firewalls, encryption, access controls, and regular patching are typically used to secure the network and systems.

Submit
27. What IDS identifies intrusions based on a preset database that identifies known attack signatures?

Explanation

A Knowledge Based IDS identifies intrusions based on a preset database that contains known attack signatures. This means that the IDS is programmed with specific patterns or characteristics of known attacks, and it compares incoming network traffic or system activity against these patterns. If a match is found, the IDS triggers an alert or takes appropriate action to mitigate the intrusion. This type of IDS relies on a database of knowledge about known attacks, making it effective in detecting and preventing known threats.

Submit
28. Which of the following is most likely to send spam emails from your computer?

Explanation

A worm is most likely to send spam emails from your computer. Unlike viruses and Trojans, worms are capable of spreading themselves without any user interaction. They can replicate and spread across networks, infecting multiple computers and using them to send out spam emails. Worms often exploit vulnerabilities in operating systems or software to gain unauthorized access to computers and use them for malicious activities, such as sending spam. Therefore, a worm is the most likely culprit for sending spam emails from your computer.

Submit
29. If you want to see unbiased tests of antivirus applications, where do you go?

Explanation

Av-comparatives.org is the correct answer because it is a reputable website that conducts unbiased tests of antivirus applications. This website provides detailed and objective reviews, comparisons, and rankings of different antivirus software, helping users make informed decisions about which antivirus program to use. It is a reliable source for unbiased information on antivirus applications.

Submit
30.
Which of the following is less likely to be detected with standard antivirus software?

Explanation

Adware is less likely to be detected with standard antivirus software because it is a type of software that displays unwanted advertisements on a user's device. Unlike viruses, worms, trojans, spyware, which are malicious and harmful, adware is often considered a low-level threat. It is designed to generate revenue for the creators by displaying ads, and it may not always exhibit the same characteristics as traditional malware. Standard antivirus software may not prioritize detecting or removing adware since it is not directly harmful to the user's device or data.

Submit
31. You can get a virus just by opening and reading your email.
Submit
View My Results

Quiz Review Timeline (Updated): Oct 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 29, 2009
    Quiz Created by
    Quizbygeohac
Cancel
  • All
    All (31)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You need to update your antivirus definition files regularly.
Security updates are needed to:
Windows updates are not necessary.
Encryption should be considered for internal network ...
I use a Mac therefore I’m not exposed to security threats.
You need to use multiple antivirus applications on the same computer.
What does SSL stand for?
DoS is a
How should you protect your wireless network?
Encrypting sensitive data on a hard drive means
Deliberate software attacks are referred to as:
DoS attacks cannot be launched against routers.
Which of the following network operating system logon ...
Which ...
What is a hash?
Which of the following is most likely to steal your identity?
This is a series of messages sent by someone ...
A (n) ________ is a computer system on the Internet ...
A hardware firewall is just a (n) ________ running on a ...
What is the main problem of a modern antivirus?
__________ is a method used by firewalls to filter and ...
A system that monitors traffic into and out of a ...
Zone Alarm is an example of a ________ firewall.
What port does secure HTTP use?
Passwords stop an intruder who gains physical access to a computer.
Auditing is used to secure the network and systems on your network.
What ...
Which of the following is most likely to send spam emails from your...
If you want to see unbiased tests of antivirus applications, where do...
Which ...
You can get a virus just by opening and reading your email.
Alert!

Advertisement