Security, Privacy, & Ethics

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Marbar726
M
Marbar726
Community Contributor
Quizzes Created: 1 | Total Attempts: 590
Questions: 13 | Attempts: 590

SettingsSettingsSettings
Security, Privacy, & Ethics - Quiz

Not graded - Just for review and practice!
Take as many times as you like


Questions and Answers
  • 1. 

    Intellectual Property (books, music, movies) says ____________ is illegal.

    • A.

      File sharing

    • B.

      Copyrighting

    • C.

      Botnetting

    • D.

      Googling

    Correct Answer
    A. File sharing
    Explanation
    Intellectual Property (books, music, movies) says file sharing is illegal. This is because file sharing involves the unauthorized distribution of copyrighted material without the permission of the copyright owner. Sharing copyrighted files without proper authorization infringes on the rights of the creators and owners of the intellectual property, which is protected by copyright laws.

    Rate this question:

  • 2. 

    Keyloggers can track and record all of the keystrokes entered on a computer. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Keyloggers are software programs or hardware devices that can track and record every keystroke entered on a computer. This includes keystrokes typed in documents, passwords entered on websites, and messages typed in chat applications. Keyloggers are often used for malicious purposes, such as stealing sensitive information or monitoring someone's activities without their knowledge. Therefore, the statement that keyloggers can track and record all keystrokes entered on a computer is true.

    Rate this question:

  • 3. 

    What is the proper way to display the following:

    • A.

      HTTP//

    • B.

      HTTP:\\

    • C.

      HTTP://

    • D.

      HTML://

    Correct Answer
    C. HTTP://
    Explanation
    The correct way to display the given text is "HTTP://". This is because URLs use forward slashes ("/") to separate different parts of the address, and "HTTP://" is the standard prefix for web addresses. The other options provided ("HTTP//", "HTTP:\\", "HTML://") do not follow the correct format for displaying URLs.

    Rate this question:

  • 4. 

    Which of the following is used by people trying to trick you into revealing personal information such as username and passwords?

    • A.

      Hacking

    • B.

      Phising

    • C.

      Spyware

    • D.

      Virus

    Correct Answer
    B. Phising
    Explanation
    Phishing is a technique used by malicious individuals to trick people into disclosing sensitive information like usernames and passwords. It typically involves sending fake emails or creating fake websites that appear legitimate, aiming to deceive users into providing their personal data. This information is then used for fraudulent activities such as identity theft or unauthorized access to accounts.

    Rate this question:

  • 5. 

    Copyright laws state that it is ILLEGAL to make a copy of items you have purchased for your own personal use. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect. Copyright laws generally allow individuals to make copies of items they have purchased for their own personal use. This includes making backup copies of digital media or creating copies of physical media for personal use. However, it is important to note that distributing or sharing these copies with others without permission would still be considered illegal.

    Rate this question:

  • 6. 

    Cookies are small text files that websites put on your computer to store information about you and your preferences. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cookies are indeed small text files that websites use to store information about users and their preferences. These files are stored on the user's computer and are used to track their browsing activity, remember login information, and personalize their experience on the website. Therefore, the statement "True" accurately describes the nature and purpose of cookies.

    Rate this question:

  • 7. 

    Spyware will....

    • A.

      Trick you into revealing personal information

    • B.

      Send information about your web surfing habits to a website without your knowledge

    • C.

      Copies every keystroke you make and sends it to a hacker

    Correct Answer
    B. Send information about your web surfing habits to a website without your knowledge
    Explanation
    Spyware is a type of malicious software that secretly gathers information about a user's online activities and sends it to a website without their knowledge. This can include details about websites visited, search queries, and other browsing habits. Unlike phishing attempts that trick users into revealing personal information, spyware operates discreetly in the background, making it difficult for users to detect. By collecting and transmitting this data, spyware poses a significant threat to user privacy and can potentially lead to identity theft or other forms of cybercrime.

    Rate this question:

  • 8. 

    The difference between a Virus and a Worm is, a virus inserts itself into files while a worm replicates itself. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A virus and a worm are both types of malicious software, but they differ in their behavior. A virus is designed to insert itself into files, such as executable files or documents, and spread by infecting other files when those files are opened or executed. On the other hand, a worm is a standalone program that replicates itself and spreads independently by exploiting vulnerabilities in computer networks or systems. Therefore, the statement that a virus inserts itself into files while a worm replicates itself is true.

    Rate this question:

  • 9. 

    A Trojan Horse enters a computer by appearing to be another program.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A Trojan Horse is a type of malicious software that disguises itself as a legitimate program or file in order to gain access to a computer system. It tricks users into downloading or installing it, often by appearing as something harmless or desirable. Once inside the computer, the Trojan Horse can perform various malicious activities, such as stealing sensitive information, damaging files, or allowing unauthorized access to the system. Therefore, the statement "A Trojan Horse enters a computer by appearing to be another program" is true because it accurately describes the deceptive nature of this type of malware.

    Rate this question:

  • 10. 

    Another name for a program is a Directory?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given answer is False. Another name for a program is not a Directory. A program refers to a set of instructions or code that performs a specific task on a computer, while a directory is a container that holds files and other directories. Although directories can contain programs, they are not synonymous terms.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 15, 2014
    Quiz Created by
    Marbar726
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.