Living Online: Cyber Security Quiz! Trivia

44 Questions | Total Attempts: 694

SettingsSettingsSettings
Please wait...
Living Online: Cyber Security Quiz! Trivia

You are living online: cybersecurity quiz trivia! The number of things that people can do online is unlimited and with this great advantage come prowlers in the name of hackers, bullies and scammers who make transacting and communicating through the internet a challenge. Do you know some of the best ways to secure your data? ? Should you open every email, you get? This quiz is a good way to see if you are safe when it comes to using the internet. Check it out!


Questions and Answers
  • 1. 
    A strong password should include which two elements?
    • A. 

      The word “password”

    • B. 

      A single dictionary word

    • C. 

      At least eight characters

    • D. 

      The user mame associated with that password

    • E. 

      A combination of letters, numbers, and symbols

  • 2. 
    What is an online discussion site where people can hold conversations in posted messages?
    • A. 

      Ad

    • B. 

      VOIP

    • C. 

      Forum

    • D. 

      Chat room

  • 3. 
    A user wants to know the differences between the 32-bit and 64-bit editions of Windows 7. The user wants to look for information on the microsoft.com website and have it appear in the first search engine results. What text string should be typed into a search engine to render the correct results?
    • A. 

      Windows 7 differences32 64 bit

    • B. 

      Windows 7 AND differences32 64 bit

    • C. 

      Windows 7 differences32 64 bit cnet.com

    • D. 

      Windows 7 differences32 64 bit site:cnet.com

  • 4. 
    How is https different from http in a URL?
    • A. 

      Https indicates that a website is hosted on a special kind of web server that supports social media.

    • B. 

      HTTP is a more secure transmission protocol because it uses public-key encryption for all transmission.

    • C. 

      Https is a more secure transmission protocol and should be used for transactions involving financial or sensitive information

    • D. 

      Http is a secure transmission protocol and provides a better chance that information will not be intercepted and decrypted by hackers.

  • 5. 
    Are you doing when you stream video from the internet to your computer?
    • A. 

      Sharing the video.

    • B. 

      Syncing the video

    • C. 

      Creating the video.

    • D. 

      Updating the video

    • E. 

      Uploading the video.

    • F. 

      Downloading the video

  • 6. 
    Which two are correct search operators? 
    • A. 

      +

    • B. 

      [ ]

    • C. 

      AND

    • D. 

      Wildcard ^

  • 7. 
    How should you evaluate conflicting advice from participants in a computer troubleshooting forum?
    • A. 

      Targeted advertising linksare useful for resolving computer issues

    • B. 

      Actions that are successful for similar configurations are more valuable

    • C. 

      Company representatives hide issues instead of presenting solutions.

    • D. 

      Comments with positive reviews from other forum participants are more useful.

    • E. 

      Forum moderator comments keep participants civil and on topic but fail to resolve problems.

  • 8. 
    What is an online discussion site where people can hold conversations in posted messages?
    • A. 

      Ad

    • B. 

      VOIP

    • C. 

      Forum

    • D. 

      Chat room

  • 9. 
    A user wants to know the differences between the 32-bit and 64-bit editions of Windows 7. The user wants to look for information on the microsoft.com website and have it appear in the first search engine results. What text string should be typed into a search engine to render the correct results?
    • A. 

      Windows 7 differences32 64 bit

    • B. 

      Windows 7 AND differences32 64 bit

    • C. 

      Windows 7 differences32 64 bit cnet.com

    • D. 

      Windows 7 differences32 64 bit site:cnet.com

  • 10. 
    What should be used before and a text string to locate an exact match in a search engine?
    • A. 

      Parentheses

    • B. 

      Square brackets

    • C. 

      Double quotation marks

    • D. 

      Less than and greater than signs

  • 11. 
    We receive an error on your Xbox 360 that says you need to open your Network Address Translation (NAT) for the game to operate effectively. You want to quickly locate the information that you need to do this. Which two should you use?
    • A. 

      Bing

    • B. 

      Windows live

    • C. 

      Xbox support forum

    • D. 

      Windows 7 Control Panel

  • 12. 
    Which two statements are true about SMS? 
    • A. 

      It is used to send long messages.

    • B. 

      It is used to send brief messages.

    • C. 

      It is used to send messages between switches.

    • D. 

      It is used to send messages between mobile phones.

  • 13. 
    What will automatically send a copy of incoming emails to the designated email address?
    • A. 

      Reply

    • B. 

      Out of office

    • C. 

      Auto forward

    • D. 

      Auto respond

  • 14. 
    Which email password is the most secure?
  • 15. 
    Will automatically send a pre-written email to senders of all incoming emails?
    • A. 

      Reply

    • B. 

      Forward

    • C. 

      Signature

    • D. 

      Out of office

  • 16. 
     A group of students created a fake social network account for one of their classmates. On the page for this account, the students presented the classmate falsely and posted hateful messages. What two terms describe this harassment?
    • A. 

      Libeling

    • B. 

      Flaming

    • C. 

      Bullying

    • D. 

      Spamming

  • 17. 
    One of the soccer players on your team posts a scathing message on the soccer league's discussion board about a coach's political views. Which term describes the player's action?
    • A. 

      Libeling

    • B. 

      Flaming

    • C. 

      Spamming

    • D. 

      Slandening

  • 18. 
    Which three statements are true about URL shortening? 
    • A. 

      Cnet.com is an example of URL shortening

    • B. 

      URL shortening can be used to disguise a web address

    • C. 

      Typical URL shortening services include Google URL shortening and bitly.

    • D. 

      URL shortening is used frequently on web sites and in apps such as Twitter

    • E. 

      If you copy and paste aURL from Internet Explorer into an email, the browser automatically converts it to a shortened URL.

  • 19. 
    When is it appropriate to use all capital ( all CAPS) in professional electronic combination?
    • A. 

      Acronyms.

    • B. 

      Email subjects.

    • C. 

      Email messages.

    • D. 

      Posts on personal social network sites.

  • 20. 
    Which two are true of telepresence?
    • A. 

      Hardware simplicity

    • B. 

      Supports collaboration

    • C. 

      Minimal communication delay

    • D. 

      Small bandwidth requirements

  • 21. 
    What are two real-time communication methods?
    • A. 

      Email

    • B. 

      Text messaging

    • C. 

      Videoconference

    • D. 

      Instant messaging

  • 22. 
    What is an example of aerial time audio and visual communication between people at different locations?
    • A. 

      FTP

    • B. 

      VoIP

    • C. 

      Podcast

    • D. 

      Videoconference

  • 23. 
    What will automatically send a pre-written email to senders of all incoming emails? 
    • A. 

      Reply

    • B. 

      Forward

    • C. 

      Signature

    • D. 

      Out of office

  • 24. 
    Which email feature automatically includes pre-written text at the end 0f all email communications?
    • A. 

      Reply

    • B. 

      Reply all

    • C. 

      Forward

    • D. 

      Signature

  • 25. 
    What will allow a user to hide an email address from other recipients?
    • A. 

      Cc

    • B. 

      Bcc

    • C. 

      Reply

    • D. 

      Reply all