Computer Security Tutorial Post-test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Adamaschun
A
Adamaschun
Community Contributor
Quizzes Created: 3 | Total Attempts: 8,372
| Attempts: 936 | Questions: 16
Please wait...
Question 1 / 16
0 %
0/100
Score 0/100
1. On a social networking site such as Facebook, you should:

Explanation

You should always be careful what information you disclose on the internet, even on "private' sites.

Submit
Please wait...
About This Quiz
Computer Security Tutorial Post-test - Quiz

Test intended to be taken after completion of the computer security tutorial.

2. A good antivirus program will both perform scans on your compter and provide real-time protection.

Explanation

A good antivirus program is designed to provide comprehensive protection for your computer. Performing regular scans helps to detect and remove any existing malware or viruses that may have infected your system. Additionally, real-time protection constantly monitors your computer's activities and blocks any potential threats in real-time, preventing them from causing harm. Therefore, a good antivirus program should have both scanning capabilities and real-time protection to ensure the highest level of security for your computer.

Submit
3. What is a trojan horse?

Explanation

While answer A is technically correct, a trojan horse in computer security is a program that acts as the one in the Greek myth. It appears to be a legitimate thing, but releases malicious code.

Submit
4. Common and widely used software products are often a target for hackers.

Explanation

Common and widely used software products are often a target for hackers because they have a larger user base, making it more appealing for hackers to exploit vulnerabilities and gain access to a larger number of potential victims. Additionally, popular software products are more likely to have known vulnerabilities, as they are extensively tested and scrutinized by security researchers, which can be exploited by hackers. Therefore, it is true that common and widely used software products are often targeted by hackers.

Submit
5. The underlying principle of social engineering is that it is easier to trick people than to hack into computers.

Explanation

Social engineering attacks employ fake emails, links, etc to gain user information.

Submit
6. It is safe to use an unknown wireless internet connection, such as those in coffee shops.

Explanation

Unknown, and more importantly unsecured, wireless connections are always a gamble. Someone ma be able to access your computer through an unsecured connection.

Submit
7. If you create a password and don't think you can remember it, you should:

Explanation

Never write down passwords, even if you intend to put them somewhere safe they can fall into the wrong hands.

Submit
8. The #1 thing you can do to avoid malware is:

Explanation

While the others aren't bad ideas, the antivirus software is the best way to avoid malware.

Submit
9. What should you consider when looking for a good anti-virus software?

Explanation

All of these questions are factors that should be considered when choosing an anti-virus program.

Submit
10. A business that you deal with often sends you an email that looks somewhat different than normal and asks for personal information. What should you do?

Explanation

never trust any email that asks for personal information. reputable businesses will not do this.

Submit
11. Program vendors create updates for software when:

Explanation

Program vendors create updates for software when a new virus is found and the software is patched to avoid infection. This is because new viruses pose a threat to the security and functionality of the software. By creating updates and patches, vendors can address vulnerabilities and provide users with a more secure and stable version of the software. This helps to protect users' data and systems from potential attacks or infections caused by the new virus.

Submit
12. Before you make a purchase online, you should look for:

Explanation

these are the very minimum security measures you should take before making an online purchase.

Submit
13. A hardware firewall is a wireless router.

Explanation

While a hardware firewall is indeed a router, it is not necessarily wireless.

Submit
14. It is safe to download files from the internet as long as you have antivirus installed.

Explanation

Even with antivirus software, you will want to create a separate folder to save all downloaded files and then run virus scans on them. don't rely on your real-time protection to catch everything.

Submit
15. When should an average user create backups?

Explanation

While once a week is usually adequate, a heavier user may want to save files as they are created.

Submit
16. Malware includes viruses, worms, spyware, adware, and spam.

Explanation

While spam emails may include malware, the emails themselves are not considered malicious software.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 03, 2010
    Quiz Created by
    Adamaschun
Cancel
  • All
    All (16)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
On a social networking site such as Facebook, you should:
A good antivirus program will both perform scans on your compter and...
What is a trojan horse?
Common and widely used software products are often a target for...
The underlying principle of social engineering is that it is easier to...
It is safe to use an unknown wireless internet connection, such...
If you create a password and don't think you can remember it, you...
The #1 thing you can do to avoid malware is:
What should you consider when looking for a good anti-virus software?
A business that you deal with often sends you an email that looks...
Program vendors create updates for software when:
Before you make a purchase online, you should look for:
A hardware firewall is a wireless router.
It is safe to download files from the internet as long as you have...
When should an average user create backups?
Malware includes viruses, worms, spyware, adware, and spam.
Alert!

Advertisement