Internet Safety, Security And Effective Use

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Inetquiz
I
Inetquiz
Community Contributor
Quizzes Created: 1 | Total Attempts: 357
Questions: 21 | Attempts: 357

SettingsSettingsSettings
Internet Safety Quizzes & Trivia

Take this test and see if you remembered anything from the course!


Questions and Answers
  • 1. 

    Which of the following would NOT pose a security risk

    • A.

      Word Documents

    • B.

      Music Files

    • C.

      Program Files

    • D.

      Applications

    Correct Answer
    B. Music Files
    Explanation
    Music files would not pose a security risk because they are typically audio files that do not have the ability to execute code or perform any actions that could potentially harm a system. Unlike Word Documents, Program Files, and Applications, which can contain executable code and potentially harmful scripts, music files are generally safe and do not have the capability to carry out any malicious activities.

    Rate this question:

  • 2. 

    Which of the following is an example of the type of soft/hardware your computer should have in order to protect itself from attack.

    • A.

      Firefox

    • B.

      Spyware

    • C.

      OS Updates

    Correct Answer
    C. OS Updates
    Explanation
    OS updates are necessary for protecting a computer from attacks. Operating system updates often include security patches that fix vulnerabilities and bugs, making it harder for attackers to exploit them. By regularly updating the operating system, users ensure that their computer has the latest security measures in place, reducing the risk of being compromised by hackers or malware. Firefox is a web browser, not a soft/hardware for computer protection, and spyware is a type of malware that poses a threat rather than protecting the computer.

    Rate this question:

  • 3. 

    What is a virus?

    • A.

      A program that causes damage to your machine

    • B.

      A program that slows your computer down

    • C.

      A program that attempts to copy itself to yours and other machines

    • D.

      A program that deletes programs

    Correct Answer
    C. A program that attempts to copy itself to yours and other machines
    Explanation
    A virus is a type of malicious program that is designed to replicate itself and spread to other machines. It does not necessarily cause damage to your machine or delete programs, although it can potentially do so. The primary characteristic of a virus is its ability to self-replicate and infect other machines, often without the user's knowledge or consent. This allows it to spread and potentially cause harm to multiple systems.

    Rate this question:

  • 4. 

    Which of these is an anti-virus program?

    • A.

      AVE

    • B.

      Kasparovsky

    • C.

      Norton

    • D.

      Treding Macro

    Correct Answer
    C. Norton
    Explanation
    Norton is an anti-virus program. It is a well-known and widely used software that provides protection against various types of malware, including viruses, spyware, and ransomware. Norton offers real-time scanning, automatic updates, and advanced security features to keep users' devices safe from cyber threats. It is a trusted name in the industry and has a good reputation for its effectiveness in detecting and removing malicious software.

    Rate this question:

  • 5. 

    What is a firewall designed to do?

    • A.

      To stop people from accessing the internet

    • B.

      To allow only emails through

    • C.

      Stopping viruses

    • D.

      Only allowing selected things in and out

    Correct Answer
    D. Only allowing selected things in and out
    Explanation
    A firewall is a security device that is designed to monitor and control incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The purpose of a firewall is to selectively allow or block certain types of traffic based on predetermined security rules. By doing so, it helps to protect the network from unauthorized access, malicious attacks, and the spread of viruses or malware. Therefore, the correct answer is "Only allowing selected things in and out."

    Rate this question:

  • 6. 

    What is spyware?

    • A.

      A program that monitors all your actions

    • B.

      A program the sends data back to a third party

    • C.

      A program the installs other applications

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Spyware is a type of malicious software that is designed to monitor and gather information about a user's activities without their knowledge or consent. It can track keystrokes, capture screenshots, record browsing history, and more. Additionally, spyware can also send this collected data back to a third party, compromising the user's privacy and security. Furthermore, spyware has the capability to install other applications on the infected device, further compromising its functionality and potentially leading to more malicious activities. Therefore, the correct answer is "All of the above" as all the given options accurately describe the characteristics and behavior of spyware.

    Rate this question:

  • 7. 

    Name an operating system that's not Windows

    • A.

      Linus

    • B.

      Torvalds 5000

    • C.

      Apple OS Y

    • D.

      Linux

    Correct Answer
    D. Linux
    Explanation
    Linux is the correct answer because it is an operating system that is not Windows. Linux is a free and open-source operating system that is widely used in various devices, including servers, desktop computers, and mobile devices. It was developed by Linus Torvalds and has a large community of contributors who continuously improve and update it. Apple OS Y is not a correct answer as it is not a recognized operating system.

    Rate this question:

  • 8. 

    Which if the following is key to staying safe online

    • A.

      Ensuring amazon is up to date

    • B.

      Installing and maintining a good CC Application

    • C.

      Running the operating system update regularly

    • D.

      All of the above

    Correct Answer
    C. Running the operating system update regularly
    Explanation
    Running the operating system update regularly is key to staying safe online. This is because operating system updates often include important security patches that address vulnerabilities and protect against potential threats. By regularly updating the operating system, users ensure that their devices have the latest security features and are less susceptible to cyber attacks. Ensuring that Amazon is up to date and installing/maintaining a good CC application are also important for online safety, but they are not as crucial as regularly updating the operating system.

    Rate this question:

  • 9. 

    Which of the following is the best browser?

    • A.

      Internet Explorer 9

    • B.

      Safari

    • C.

      Firefox

    • D.

      Chrome

    • E.

      Opera

    • F.

      Errrrrm, there is no best browser?

    Correct Answer
    F. Errrrrm, there is no best browser?
    Explanation
    The given answer "Errrrrm, there is no best browser?" is the best answer because the choice of a browser depends on personal preference and individual needs. Different browsers have different features, speed, security, and compatibility with websites. What may be the best browser for one person may not be the same for another. Therefore, it is subjective to determine a universally best browser, making the given answer the most appropriate.

    Rate this question:

  • 10. 

    What are the 3 Rs

    • A.

      Risk Reasonableness and Responsibility

    • B.

      Risk Rewards and Response

    • C.

      Responsibility Risk and Reputation

    Correct Answer
    C. Responsibility Risk and Reputation
    Explanation
    The three Rs in this context refer to Responsibility, Risk, and Reputation. Responsibility implies being accountable for one's actions and decisions. Risk refers to the potential for loss or harm that may arise from these actions or decisions. Reputation refers to the perception or opinion that others have of an individual or organization based on their actions and behavior. These three factors are interconnected, as being responsible and managing risks effectively can help protect and enhance one's reputation.

    Rate this question:

  • 11. 

    What kind of details are easily discoverable by a webmaster?

    • A.

      Your address

    • B.

      Your name

    • C.

      The area you live

    • D.

      Your phone number

    Correct Answer
    C. The area you live
    Explanation
    A webmaster can easily discover the area you live in by analyzing your IP address or through other tracking techniques. However, it is important to note that a webmaster cannot easily obtain your specific address, name, or phone number without your consent or providing that information voluntarily on a website. These details are typically considered private and require explicit permission or disclosure from the user.

    Rate this question:

  • 12. 

    What type of internet technology does Opera Turbo use?

    • A.

      Proxy server

    • B.

      Poxy server

    • C.

      ADSL

    • D.

      Dial-up

    Correct Answer
    A. Proxy server
    Explanation
    Opera Turbo uses a proxy server as its internet technology. A proxy server acts as an intermediary between the user's device and the internet, optimizing and compressing web pages before they are delivered to the user. This helps in reducing the amount of data that needs to be transferred, resulting in faster browsing speeds and reduced data usage.

    Rate this question:

  • 13. 

    What is the problem with using proxy servers?

    • A.

      Your search results are forwarded on

    • B.

      The proxy server gets access to your machine

    • C.

      Only criminals use proxy servers

    • D.

      Your IP address can be forwarded on

    Correct Answer
    D. Your IP address can be forwarded on
    Explanation
    Using proxy servers can pose a problem because your IP address can be forwarded on. When you connect to a website through a proxy server, the website sees the IP address of the proxy server instead of your own. However, the proxy server can still forward your IP address to the website, potentially compromising your privacy and anonymity. This can be a concern for individuals who wish to keep their online activities private or want to access restricted content without being traced.

    Rate this question:

  • 14. 

    What is a noise search?

    • A.

      When you look for pop music

    • B.

      When you mix genuine and false search terms

    • C.

      When you carry out a lot of searches at one time

    • D.

      When you don't know what you are looking for

    Correct Answer
    B. When you mix genuine and false search terms
    Explanation
    A noise search refers to the act of mixing genuine and false search terms. This means that instead of using accurate and relevant keywords, the search includes both correct and incorrect terms, leading to a less precise or accurate search result. This can be done intentionally or unintentionally and may result in irrelevant or misleading information.

    Rate this question:

  • 15. 

    What is one of the problems with using web archives?

    • A.

      They can produce unusual requests from the host website

    • B.

      Its slower than looking at the actual website

    • C.

      It is technically illegal to look at web archives

    Correct Answer
    A. They can produce unusual requests from the host website
    Explanation
    One of the problems with using web archives is that they can generate unusual requests from the host website. When accessing web archives, the archived content is retrieved from the host website's server, which may result in unexpected or unusual requests being sent to the server. This can potentially overload the server or cause it to respond in unpredictable ways, affecting the user experience and the functionality of the web archive.

    Rate this question:

  • 16. 

    What are plug-ins?

    • A.

      An air freshener that you put into an electrical outlet

    • B.

      A form of anti-virus software

    • C.

      A way of increasing your internet speed

    • D.

      A series of additions to your web browser

    Correct Answer
    D. A series of additions to your web browser
    Explanation
    Plug-ins are additional software components that can be added to a web browser to enhance its functionality. They provide extra features and capabilities that are not included in the browser's default settings. These additions can include tools for viewing multimedia content, blocking advertisements, managing downloads, and improving security. Plug-ins are designed to customize and optimize the browsing experience according to the user's needs and preferences.

    Rate this question:

  • 17. 

    What does private browsing NOT do?

    • A.

      It does not hide your IP address

    • B.

      It does not hide your internet history from your computer

    • C.

      It does not limit cookies

    Correct Answer
    A. It does not hide your IP address
    Explanation
    Private browsing, also known as incognito mode, is a feature in web browsers that allows users to browse the internet without saving any browsing history, cookies, or other data. However, it does not hide the user's IP address. The IP address is a unique identifier assigned to each device connected to the internet, and private browsing does not alter or conceal this information. Therefore, even when using private browsing, websites and online services can still see the user's IP address and potentially track their online activities.

    Rate this question:

  • 18. 

    Google SSL allows you to do what?

    • A.

      Encrypts your web traffic

    • B.

      Encrypts your search results

    • C.

      Encrypts your search terms

    • D.

      Encrypts both your search terms and results

    Correct Answer
    D. Encrypts both your search terms and results
    Explanation
    Google SSL (Secure Sockets Layer) encrypts both your search terms and results. SSL is a security protocol that ensures the confidentiality and integrity of data transmitted between a web browser and a web server. By encrypting the search terms, it prevents unauthorized access to the specific keywords you search for. Additionally, it encrypts the search results, making it difficult for anyone to intercept or tamper with the information displayed on the search results page. This encryption enhances privacy and security while using Google's services.

    Rate this question:

  • 19. 

    What is a key benefit of Tor?

    • A.

      It hides your IP address from your internet supplier

    • B.

      It hides your IP address from the site you are visiting

    • C.

      It stops hackers from attacking your machine

    • D.

      It provides a secure method of using the Internet

    Correct Answer
    B. It hides your IP address from the site you are visiting
    Explanation
    Tor is a network that allows users to browse the internet anonymously. It achieves this by routing internet traffic through a series of volunteer-operated servers, encrypting the data at each step. The benefit of Tor is that it hides the user's IP address from the site they are visiting. This means that the website cannot trace the user's location or identity based on their IP address. By keeping the user's IP address hidden, Tor enhances privacy and security while browsing the internet.

    Rate this question:

  • 20. 

    What is the main downside to using Tor?

    • A.

      Its difficult to use

    • B.

      Your search results won't be accurate

    • C.

      You don't know whose computers your traffic is passing through

    • D.

      It's illegal

    Correct Answer
    C. You don't know whose computers your traffic is passing through
    Explanation
    The main downside to using Tor is that you don't know whose computers your traffic is passing through. Tor works by routing your internet traffic through a network of volunteer-operated servers, called nodes, which makes it difficult to trace the origin of the traffic. While this provides anonymity, it also means that your data could potentially be intercepted or monitored by malicious nodes. This lack of transparency regarding the routing of your traffic is a significant drawback of using Tor.

    Rate this question:

  • 21. 

    What should you NOT do on a deniable connection?

    • A.

      Check train times from the office

    • B.

      Read Stephen Frys tweets

    • C.

      Check the football scores

    • D.

      Send a message from your webmail account

    • E.

      Check your internet banking account

    Correct Answer(s)
    D. Send a message from your webmail account
    E. Check your internet banking account
    Explanation
    On a deniable connection, you should not send a message from your webmail account or check your internet banking account. This is because a deniable connection is a type of connection that allows you to browse the internet privately and anonymously, without leaving any trace of your online activities. Sending a message from your webmail account or accessing your internet banking account would require you to log in with your personal information, which could potentially compromise your anonymity and privacy. Therefore, it is advised to avoid such activities on a deniable connection.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2011
    Quiz Created by
    Inetquiz
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.