Internet Safety, Security And Marketing Tools! Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ppageegsd
P
Ppageegsd
Community Contributor
Quizzes Created: 14 | Total Attempts: 9,714
| Attempts: 145 | Questions: 11
Please wait...
Question 1 / 11
0 %
0/100
Score 0/100
1. What is spam?

Explanation

Spam refers to unwanted or unsolicited electronic messages. These messages are typically sent in bulk to a large number of recipients without their consent. Spam can include various types of content such as advertisements, scams, phishing attempts, or malicious links. It is considered a nuisance and can clog up email inboxes, consume storage space, and potentially contain harmful content.

Submit
Please wait...
About This Quiz
Internet Safety, Security And Marketing Tools! Quiz - Quiz

This quiz on 'Internet Safety, Security and Marketing Tools' assesses knowledge on cyber threats like phishing, pharming, and spam. It evaluates understanding of security concepts and awareness of... see morepotential online risks, crucial for safe internet practices. see less

2. Mel receives and e-mail allegedly from his mobile phone service provider. It has the company logo prominently featured at the top of the communication and states that the company is updating all client records. Mel is asked to re-submit his account information including name, address, home phone number and the credit card number tied to his account for billing purposes.  This could be an example of _______

Explanation

The given scenario is an example of phishing, where an attacker impersonates a legitimate company to trick individuals into providing their personal and financial information. The email asks Mel to submit sensitive details like his credit card number, which is a common tactic used by phishers. To protect himself from potential fraud or identity theft, Mel should promptly delete the message and not respond or provide any information.

Submit
3. Which of the following is an example of an accurately constructed Boolean search string?

Explanation

The correct answer is "internet AND marketing" because it uses the Boolean operator "AND" to combine the two search terms "internet" and "marketing". This means that the search results will only include pages that contain both of these terms, narrowing down the search and making it more specific.

Submit
4. Flash cookies serve the following purpose:

Explanation

Flash cookies serve all of the above purposes. They can remember preferences such as volume settings for videos, allowing a personalized experience for users. They also enable users to watch videos on sites that use Adobe Flash. Additionally, flash cookies can track users' activities online, which can be used for targeted advertising.

Submit
5. You can optimize your search results on the Web by ____

Explanation

The correct answer is "all of the above." By using reliable resources such as EBSCO and recognized news sites, you can ensure that the information you find is accurate and trustworthy. Additionally, using several different types of search engines can help you access a wider range of information and perspectives. Finally, sticking to your topic and avoiding distractions allows you to focus on the most relevant search results. Therefore, by doing all of these things, you can optimize your search results on the web.

Submit
6. Sending insulting messages across peer-to-peer networks is an example of _______

Explanation

Flaming refers to the act of sending insulting or aggressive messages over the internet, often in online communities or through peer-to-peer networks. This behavior is characterized by the intention to provoke or offend others, typically resulting in heated arguments or conflicts. It is a form of cyberbullying or harassment that aims to create a hostile environment and negatively impact the targeted individuals.

Submit
7. The act of disguising a website as a  legitimate one in order to gain access to personally identifiable information (PII) is known as _____.

Explanation

Pharming is the act of disguising a website as a legitimate one in order to gain access to personally identifiable information (PII). It is a form of online fraud where attackers redirect users to a fake website that looks identical to the original, tricking them into entering their sensitive information. Unlike phishing, which relies on luring victims through deceptive emails or messages, pharming directly redirects users to a fraudulent website without their knowledge or consent. This technique is used to steal personal data such as usernames, passwords, credit card details, and more.

Submit
8. Which of the following statements about meta-search engines is NOT true?

Explanation

Meta-search engines are not a waste of time because they provide very few results. In fact, meta-search engines can be beneficial as they scan multiple search engine databases and provide results based on the keyword(s) submitted. While they can save time by aggregating results from various search engines, it is not advisable to rely on them exclusively as they may not cover all search engines or provide comprehensive results.

Submit
9. RSS provides an efficient way for an internet user to ______________

Explanation

RSS provides an efficient way for an internet user to use a "reader" to review information compiled from a number of sources based on pre-selected preferences. This means that instead of visiting multiple websites individually to check for updates, the user can subscribe to RSS feeds from their favorite websites and have the content delivered to their reader. The reader collects and displays the latest updates from all the subscribed sources in one place, making it easier for the user to stay updated with the latest information without the need for manual checking.

Submit
10. This sophisticated piece of software tracks what users are typing on a website.

Explanation

A beacon is a small piece of code embedded in a website that allows tracking of user activity, such as what they are typing. It is a sophisticated tool used to monitor user behavior and collect data. Unlike flash cookies, trackers, or third-party monitors, a beacon specifically focuses on tracking user input on a website.

Submit
11. An IP or internet protocol address is an example of ______________

Explanation

An IP address is an example of non PII (Personally Identifiable Information) because it does not directly identify an individual. It is a unique numerical label assigned to each device connected to a computer network. While it can be used to determine the general location of a device, it does not reveal specific personal information about the user. Therefore, an IP address is considered non PII.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 19, 2010
    Quiz Created by
    Ppageegsd
Cancel
  • All
    All (11)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is spam?
Mel receives and e-mail allegedly from his mobile phone service...
Which of the following is an example of an accurately...
Flash cookies serve the following purpose:
You can optimize your search results on the Web by ____
Sending insulting messages across peer-to-peer networks is an example...
The act of disguising a website as a  legitimate one in...
Which of the following statements about meta-search engines is NOT...
RSS provides an efficient way for an internet user to...
This sophisticated piece of software tracks what users are typing on a...
An IP or internet protocol address is an example of ______________
Alert!

Advertisement