Computer Security Tutorial Post-test

16 Questions | Total Attempts: 511

SettingsSettingsSettings
Please wait...
Computer Security Tutorial Post-test

Test intended to be taken after completion of the computer security tutorial.


Questions and Answers
  • 1. 
    If you create a password and don't think you can remember it, you should:
    • A. 

      Tattoo it between your toes

    • B. 

      Write it down and keep it in a safe place.

    • C. 

      Write down a hint that only makes sense to you and keep it secure.

  • 2. 
    A business that you deal with often sends you an email that looks somewhat different than normal and asks for personal information. What should you do?
    • A. 

      Reply to the email with the requested information.

    • B. 

      Call the business and verify that the email is from them- but still don't respond to the email.

    • C. 

      Delete the email and don't do business with them anymore.

  • 3. 
    On a social networking site such as Facebook, you should:
    • A. 

      Disclose as much personal information as you like.

    • B. 

      Click on all the interesting ads on the side of the page.

    • C. 

      Be careful what personal information you post, and use privacy settings.

  • 4. 
    Before you make a purchase online, you should look for:
    • A. 

      "https" preceeding the web address.

    • B. 

      A padlock symbol signifying that the site is secure.

    • C. 

      A place to enter your credit card number.

    • D. 

      All of the above

    • E. 

      Answers A and B

  • 5. 
    It is safe to use an unknown wireless internet connection, such as those in coffee shops.
    • A. 

      True

    • B. 

      False

  • 6. 
    What is a trojan horse?
    • A. 

      A large wooden vehicle for soldiers to hide in and take over the city of Troy.

    • B. 

      A computer program that pretends to be one thing but causes harm when accessed.

    • C. 

      An email scam.

  • 7. 
    Malware includes viruses, worms, spyware, adware, and spam.
    • A. 

      True

    • B. 

      False

  • 8. 
    The underlying principle of social engineering is that it is easier to trick people than to hack into computers.
    • A. 

      True

    • B. 

      False

  • 9. 
    The #1 thing you can do to avoid malware is:
    • A. 

      Install antivirus software and keep it updated.

    • B. 

      Don't open email attachments.

    • C. 

      Don't download anything from the web.

  • 10. 
    It is safe to download files from the internet as long as you have antivirus installed.
    • A. 

      True

    • B. 

      False

  • 11. 
    What should you consider when looking for a good anti-virus software?
    • A. 

      Does the software prevent many types of malware?

    • B. 

      Does the software run efficently on your system?

    • C. 

      Does it have good tech support?

    • D. 

      All of the above

  • 12. 
    A hardware firewall is a wireless router.
    • A. 

      True

    • B. 

      False

  • 13. 
    A good antivirus program will both perform scans on your compter and provide real-time protection.
    • A. 

      True

    • B. 

      False

  • 14. 
    When should an average user create backups?
    • A. 

      Once a day

    • B. 

      Once a week

    • C. 

      Once a month

  • 15. 
    Program vendors create updates for software when:
    • A. 

      Programmers have a new idea.

    • B. 

      A new virus is found and the software is patched to avoid infection.

    • C. 

      They feel like it.

  • 16. 
    Common and widely used software products are often a target for hackers.
    • A. 

      True

    • B. 

      False

Back to Top Back to top