How Internet Security Fights Off PC Invaders

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Calland36
C
Calland36
Community Contributor
Quizzes Created: 1 | Total Attempts: 115
| Attempts: 115 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1. The best way to avoid viruses in e-mails is to not open up junk mail, and to avoid suspicious e-mail senders or subjects.

Explanation

The statement is true because opening junk mail or emails from suspicious senders or with suspicious subjects increases the risk of getting viruses. By not opening these types of emails, one can significantly reduce the chances of getting infected with viruses.

Submit
Please wait...
About This Quiz
How Internet Security Fights Off PC Invaders - Quiz

Explore the essentials of internet security through this engaging quiz titled 'How Internet Security Fights Off PC Invaders'. Learn about viruses, their transport mechanisms, and specific threats like... see morethe ILOVEYOU virus. Understand the roles of different malware types in compromising PC security. see less

2. The way a virus travels through your e-mail is by an Attachment.

Explanation

A virus can indeed travel through email attachments. When an infected attachment is opened or downloaded, the virus can gain access to the recipient's computer system and potentially cause harm. It is important to exercise caution when opening attachments from unknown or suspicious sources to avoid falling victim to a virus or malware attack.

Submit
3. What is one way a hacker can break into your PC?

Explanation

A hacker can break into your PC by locating your IP address and targeting low security computers. This is because the IP address acts as a unique identifier for your computer on the internet, and if the hacker can find it, they can then focus their efforts on finding vulnerabilities in computers with low security measures in place. By exploiting these vulnerabilities, the hacker can gain unauthorized access to your PC and potentially steal sensitive information or cause damage.

Submit
4. A Trojan Horse is a type of virus.

Explanation

A Trojan Horse is a type of malware that disguises itself as a legitimate program or file in order to gain unauthorized access to a computer system. It is often used by hackers to steal sensitive information or to gain control over a computer. While a Trojan Horse is often referred to as a virus, it is technically not a virus itself. However, it is still considered a type of malware, making the statement "A Trojan Horse is a type of virus" true.

Submit
5. Their is only 1 kind of anti-virus available to the public.

Explanation

The statement is false because there are multiple kinds of anti-virus software available to the public. There are various companies and developers that offer different anti-virus programs with different features and capabilities. Users can choose from a range of options based on their specific needs and preferences. Therefore, the statement that there is only 1 kind of anti-virus available to the public is incorrect.

Submit
6. What does a computer Worm do?

Explanation

A computer worm is a type of malicious software that is designed to self-replicate and spread across computer networks. Unlike viruses, worms do not need to attach themselves to an existing program or file to infect a computer. Instead, they take advantage of security vulnerabilities to automatically replicate and spread to other computers. This can cause significant damage to computer systems and networks by consuming bandwidth, slowing down systems, and potentially compromising sensitive information.

Submit
7. All legitamate virus protection costs money

Explanation

The statement "All legitimate virus protection costs money" is false because there are many legitimate virus protection options available for free. While some antivirus software may require a paid subscription for additional features or advanced protection, there are reputable free antivirus programs that offer basic protection against viruses and malware. Therefore, it is not true that all legitimate virus protection costs money.

Submit
8. What yead did the ILOVEYOU virus appear?

Explanation

The ILOVEYOU virus appeared in the year 2000.

Submit
9. Why is all of this important for digital artists?

Explanation

Digital artists rely heavily on software and computer systems to create their artwork. If their software gets damaged by viruses, it can hinder their ability to work efficiently and effectively. Additionally, if viruses corrupt files in their computer, it can result in the loss of important documents and artwork. Moreover, if viruses infect important OS files that shut down computers, it can disrupt their workflow and cause significant downtime. Therefore, understanding the importance of protecting against viruses is crucial for digital artists to ensure the safety and integrity of their work.

Submit
10. A firewall is considered a Antivirus Software

Explanation

A firewall is not considered antivirus software. While both are security measures, they serve different purposes. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, protecting against unauthorized access and potential threats. On the other hand, antivirus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, from a computer system. It scans files and programs for known patterns of malicious code and takes actions to quarantine or remove them.

Submit
11. What choice(s) are the key targets for computer hackers

Explanation

Computer hackers target computers that have not been updated, computers with old software, and computers lacking in virus protection because these vulnerabilities provide an opportunity for hackers to exploit. Outdated software and lack of updates often mean that the computer's security features are not up to date, making it easier for hackers to find and exploit vulnerabilities. Similarly, computers lacking in virus protection are more susceptible to malware and other malicious attacks, providing hackers with an entry point to gain unauthorized access or steal sensitive information.

Submit
12. What is a virus?

Explanation

A virus is a typically small piece of software that is attached onto other programs. This means that it is not a standalone program, but rather it piggybacks onto existing software. Once attached, the virus can replicate itself and spread to other programs or files, causing harm to the computer system. This method of infection allows viruses to easily spread and infect multiple files or computers, making them a common threat in the digital world.

Submit
13. What ways are viruses transported?

Explanation

Viruses can be transported through various means such as email, music downloads, and cookies. Email attachments can contain malicious files that can infect a computer when opened. Similarly, downloading music from untrusted sources can lead to the inadvertent download of infected files. Additionally, cookies, which are small files stored on a user's computer by websites, can be manipulated by hackers to deliver malware. Therefore, it is important to exercise caution when engaging in these activities to prevent virus transmission.

Submit
View My Results

Quiz Review Timeline (Updated): Dec 13, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 13, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 13, 2011
    Quiz Created by
    Calland36
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The best way to avoid viruses in e-mails is to not open up junk mail,...
The way a virus travels through your e-mail is by an Attachment.
What is one way a hacker can break into your PC?
A Trojan Horse is a type of virus.
Their is only 1 kind of anti-virus available to the public.
What does a computer Worm do?
All legitamate virus protection costs money
What yead did the ILOVEYOU virus appear?
Why is all of this important for digital artists?
A firewall is considered a Antivirus Software
What choice(s) are the key targets for computer hackers
What is a virus?
What ways are viruses transported?
Alert!

Advertisement