Security, Privacy, & Ethics

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Marbar726
M
Marbar726
Community Contributor
Quizzes Created: 1 | Total Attempts: 619
| Attempts: 619 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1. Keyloggers can track and record all of the keystrokes entered on a computer. 

Explanation

Keyloggers are software programs or hardware devices that can track and record every keystroke entered on a computer. This includes keystrokes typed in documents, passwords entered on websites, and messages typed in chat applications. Keyloggers are often used for malicious purposes, such as stealing sensitive information or monitoring someone's activities without their knowledge. Therefore, the statement that keyloggers can track and record all keystrokes entered on a computer is true.

Submit
Please wait...
About This Quiz
Security, Privacy, & Ethics - Quiz

Not graded - Just for review and practice!
Take as many times as you like

2. Cookies are small text files that websites put on your computer to store information about you and your preferences. 

Explanation

Cookies are indeed small text files that websites use to store information about users and their preferences. These files are stored on the user's computer and are used to track their browsing activity, remember login information, and personalize their experience on the website. Therefore, the statement "True" accurately describes the nature and purpose of cookies.

Submit
3. A Trojan Horse enters a computer by appearing to be another program.

Explanation

A Trojan Horse is a type of malicious software that disguises itself as a legitimate program or file in order to gain access to a computer system. It tricks users into downloading or installing it, often by appearing as something harmless or desirable. Once inside the computer, the Trojan Horse can perform various malicious activities, such as stealing sensitive information, damaging files, or allowing unauthorized access to the system. Therefore, the statement "A Trojan Horse enters a computer by appearing to be another program" is true because it accurately describes the deceptive nature of this type of malware.

Submit
4. The difference between a Virus and a Worm is, a virus inserts itself into files while a worm replicates itself. 

Explanation

A virus and a worm are both types of malicious software, but they differ in their behavior. A virus is designed to insert itself into files, such as executable files or documents, and spread by infecting other files when those files are opened or executed. On the other hand, a worm is a standalone program that replicates itself and spreads independently by exploiting vulnerabilities in computer networks or systems. Therefore, the statement that a virus inserts itself into files while a worm replicates itself is true.

Submit
5. What is the proper way to display the following:

Explanation

The correct way to display the given text is "HTTP://". This is because URLs use forward slashes ("/") to separate different parts of the address, and "HTTP://" is the standard prefix for web addresses. The other options provided ("HTTP//", "HTTP:\\", "HTML://") do not follow the correct format for displaying URLs.

Submit
6. Another name for a program is a Directory?

Explanation

The given answer is False. Another name for a program is not a Directory. A program refers to a set of instructions or code that performs a specific task on a computer, while a directory is a container that holds files and other directories. Although directories can contain programs, they are not synonymous terms.

Submit
7. Which of the following is used by people trying to trick you into revealing personal information such as username and passwords?

Explanation

Phishing is a technique used by malicious individuals to trick people into disclosing sensitive information like usernames and passwords. It typically involves sending fake emails or creating fake websites that appear legitimate, aiming to deceive users into providing their personal data. This information is then used for fraudulent activities such as identity theft or unauthorized access to accounts.

Submit
8. Spyware will....

Explanation

Spyware is a type of malicious software that secretly gathers information about a user's online activities and sends it to a website without their knowledge. This can include details about websites visited, search queries, and other browsing habits. Unlike phishing attempts that trick users into revealing personal information, spyware operates discreetly in the background, making it difficult for users to detect. By collecting and transmitting this data, spyware poses a significant threat to user privacy and can potentially lead to identity theft or other forms of cybercrime.

Submit
9. Copyright laws state that it is ILLEGAL to make a copy of items you have purchased for your own personal use. 

Explanation

The statement is incorrect. Copyright laws generally allow individuals to make copies of items they have purchased for their own personal use. This includes making backup copies of digital media or creating copies of physical media for personal use. However, it is important to note that distributing or sharing these copies with others without permission would still be considered illegal.

Submit
10. Intellectual Property (books, music, movies) says ____________ is illegal.

Explanation

Intellectual Property (books, music, movies) says file sharing is illegal. This is because file sharing involves the unauthorized distribution of copyrighted material without the permission of the copyright owner. Sharing copyrighted files without proper authorization infringes on the rights of the creators and owners of the intellectual property, which is protected by copyright laws.

Submit
11. Match the following
Submit
12. Match the following
Submit
13. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 15, 2014
    Quiz Created by
    Marbar726
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Keyloggers can track and record all of the keystrokes entered on a...
Cookies are small text files that websites put on your computer to...
A Trojan Horse enters a computer by appearing to be another program.
The difference between a Virus and a Worm is, a virus inserts itself...
What is the proper way to display the following:
Another name for a program is a Directory?
Which of the following is used by people trying to trick you into...
Spyware will....
Copyright laws state that it is ILLEGAL to make a copy of items you...
Intellectual Property (books, music, movies) says ____________ is...
Match the following
Match the following
Match the following
Alert!

Advertisement