Computer Security Tutorial Post-test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Adamaschun
A
Adamaschun
Community Contributor
Quizzes Created: 3 | Total Attempts: 7,818
Questions: 16 | Attempts: 793

SettingsSettingsSettings
Computer Security Tutorial Post-test - Quiz

Test intended to be taken after completion of the computer security tutorial.


Questions and Answers
  • 1. 

    If you create a password and don't think you can remember it, you should:

    • A.

      Tattoo it between your toes

    • B.

      Write it down and keep it in a safe place.

    • C.

      Write down a hint that only makes sense to you and keep it secure.

    Correct Answer
    C. Write down a hint that only makes sense to you and keep it secure.
    Explanation
    Never write down passwords, even if you intend to put them somewhere safe they can fall into the wrong hands.

    Rate this question:

  • 2. 

    A business that you deal with often sends you an email that looks somewhat different than normal and asks for personal information. What should you do?

    • A.

      Reply to the email with the requested information.

    • B.

      Call the business and verify that the email is from them- but still don't respond to the email.

    • C.

      Delete the email and don't do business with them anymore.

    Correct Answer
    B. Call the business and verify that the email is from them- but still don't respond to the email.
    Explanation
    never trust any email that asks for personal information. reputable businesses will not do this.

    Rate this question:

  • 3. 

    On a social networking site such as Facebook, you should:

    • A.

      Disclose as much personal information as you like.

    • B.

      Click on all the interesting ads on the side of the page.

    • C.

      Be careful what personal information you post, and use privacy settings.

    Correct Answer
    C. Be careful what personal information you post, and use privacy settings.
    Explanation
    You should always be careful what information you disclose on the internet, even on "private' sites.

    Rate this question:

  • 4. 

    Before you make a purchase online, you should look for:

    • A.

      "https" preceeding the web address.

    • B.

      A padlock symbol signifying that the site is secure.

    • C.

      A place to enter your credit card number.

    • D.

      All of the above

    • E.

      Answers A and B

    Correct Answer
    E. Answers A and B
    Explanation
    these are the very minimum security measures you should take before making an online purchase.

    Rate this question:

  • 5. 

    It is safe to use an unknown wireless internet connection, such as those in coffee shops.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Unknown, and more importantly unsecured, wireless connections are always a gamble. Someone ma be able to access your computer through an unsecured connection.

    Rate this question:

  • 6. 

    What is a trojan horse?

    • A.

      A large wooden vehicle for soldiers to hide in and take over the city of Troy.

    • B.

      A computer program that pretends to be one thing but causes harm when accessed.

    • C.

      An email scam.

    Correct Answer
    B. A computer program that pretends to be one thing but causes harm when accessed.
    Explanation
    While answer A is technically correct, a trojan horse in computer security is a program that acts as the one in the Greek myth. It appears to be a legitimate thing, but releases malicious code.

    Rate this question:

  • 7. 

    Malware includes viruses, worms, spyware, adware, and spam.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    While spam emails may include malware, the emails themselves are not considered malicious software.

    Rate this question:

  • 8. 

    The underlying principle of social engineering is that it is easier to trick people than to hack into computers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Social engineering attacks employ fake emails, links, etc to gain user information.

    Rate this question:

  • 9. 

    The #1 thing you can do to avoid malware is:

    • A.

      Install antivirus software and keep it updated.

    • B.

      Don't open email attachments.

    • C.

      Don't download anything from the web.

    Correct Answer
    A. Install antivirus software and keep it updated.
    Explanation
    While the others aren't bad ideas, the antivirus software is the best way to avoid malware.

    Rate this question:

  • 10. 

    It is safe to download files from the internet as long as you have antivirus installed.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Even with antivirus software, you will want to create a separate folder to save all downloaded files and then run virus scans on them. don't rely on your real-time protection to catch everything.

    Rate this question:

  • 11. 

    What should you consider when looking for a good anti-virus software?

    • A.

      Does the software prevent many types of malware?

    • B.

      Does the software run efficently on your system?

    • C.

      Does it have good tech support?

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of these questions are factors that should be considered when choosing an anti-virus program.

    Rate this question:

  • 12. 

    A hardware firewall is a wireless router.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    While a hardware firewall is indeed a router, it is not necessarily wireless.

    Rate this question:

  • 13. 

    A good antivirus program will both perform scans on your compter and provide real-time protection.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A good antivirus program is designed to provide comprehensive protection for your computer. Performing regular scans helps to detect and remove any existing malware or viruses that may have infected your system. Additionally, real-time protection constantly monitors your computer's activities and blocks any potential threats in real-time, preventing them from causing harm. Therefore, a good antivirus program should have both scanning capabilities and real-time protection to ensure the highest level of security for your computer.

    Rate this question:

  • 14. 

    When should an average user create backups?

    • A.

      Once a day

    • B.

      Once a week

    • C.

      Once a month

    Correct Answer
    B. Once a week
    Explanation
    While once a week is usually adequate, a heavier user may want to save files as they are created.

    Rate this question:

  • 15. 

    Program vendors create updates for software when:

    • A.

      Programmers have a new idea.

    • B.

      A new virus is found and the software is patched to avoid infection.

    • C.

      They feel like it.

    Correct Answer
    B. A new virus is found and the software is patched to avoid infection.
    Explanation
    Program vendors create updates for software when a new virus is found and the software is patched to avoid infection. This is because new viruses pose a threat to the security and functionality of the software. By creating updates and patches, vendors can address vulnerabilities and provide users with a more secure and stable version of the software. This helps to protect users' data and systems from potential attacks or infections caused by the new virus.

    Rate this question:

  • 16. 

    Common and widely used software products are often a target for hackers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Common and widely used software products are often a target for hackers because they have a larger user base, making it more appealing for hackers to exploit vulnerabilities and gain access to a larger number of potential victims. Additionally, popular software products are more likely to have known vulnerabilities, as they are extensively tested and scrutinized by security researchers, which can be exploited by hackers. Therefore, it is true that common and widely used software products are often targeted by hackers.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 03, 2010
    Quiz Created by
    Adamaschun
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.