The Big Quiz On Computers

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Alfredhook3
A
Alfredhook3
Community Contributor
Quizzes Created: 2945 | Total Attempts: 2,890,217
| Attempts: 639 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. When referred to in computer networking, what is "WLAN"?

Explanation

WLAN stands for Wireless Local Area Network. It is a type of computer network that allows devices to connect and communicate wirelessly within a limited area, such as a home, office, or campus. This technology uses radio waves to transmit data between devices, eliminating the need for physical cables. WLANs provide flexibility and convenience for users, as they can access the network and internet from anywhere within the coverage area.

Submit
Please wait...
About This Quiz
The Big Quiz On Computers - Quiz

The Big Quiz On Computers tests knowledge on various aspects of computer security and networking, including rootkits, encryption, browser updates, VoIP, and internet connectivity. It is ideal for... see morelearners seeking to enhance their understanding of computer security. see less

2. What term refers to a set of programs used to access and gain admin access to a system?

Explanation

A rootkit is a set of programs that are designed to gain unauthorized access and administrative control over a computer system. It allows attackers to hide their presence and activities on the system, making it difficult for users or security tools to detect their malicious actions. Rootkits are commonly used by hackers to gain control over a system and carry out various malicious activities, such as stealing sensitive information, modifying system settings, or launching further attacks.

Submit
3. In order to enhance security, TKIP encryption periodically changes what?

Explanation

TKIP encryption periodically changes the Encryption Key. This is done to enhance security by preventing unauthorized access to the network. By regularly changing the Encryption Key, it becomes more difficult for potential attackers to decipher the encrypted data and gain unauthorized access to the network. This helps to protect the confidentiality and integrity of the transmitted data.

Submit
4. What term refers to usually-public places for people to get wireless access to the Internet?

Explanation

A hotspot refers to usually-public places where people can access the Internet wirelessly. It is a location that provides Wi-Fi connectivity to users, allowing them to connect their devices and access the Internet. Hotspots are commonly found in cafes, airports, hotels, and other public areas where people may need to connect to the Internet while on the go.

Submit
5. What network feature is used to make emergency calls over VoIP?

Explanation

Enhanced 911 is the correct answer because it is a network feature that allows emergency calls to be made over VoIP (Voice over Internet Protocol). Enhanced 911 provides the ability to automatically transmit the caller's location information to emergency services, enabling them to quickly respond to the emergency. This feature is crucial in ensuring that emergency calls made over VoIP are properly routed and responded to in a timely manner.

Submit
6. The RSA cryptography algorithm was invented by Ron Rivest, Adi Shamir and who else?

Explanation

The correct answer is Leonard Adleman. He, along with Ron Rivest and Adi Shamir, invented the RSA cryptography algorithm.

Submit
7. A May, 2009 release of a new version of which Google browser promised faster access?

Explanation

The correct answer is "Chrome." In May 2009, Google released a new version of their browser, Chrome, which promised faster access.

Submit
8. What term applies to the designation of traffic type for a connection, such as HTTP's 80?

Explanation

The term that applies to the designation of traffic type for a connection, such as HTTP's 80, is "Port". In computer networking, a port is a communication endpoint that is used to identify specific processes or services on a networked device. Ports are assigned specific numbers, and each number is associated with a particular protocol or service. In this case, HTTP typically uses port number 80 to establish a connection.

Submit
9. What type of message has a hidden message encoded within the obvious external message?

Explanation

Steganographic messages have a hidden message encoded within the obvious external message. Steganography is the practice of concealing information within another form of data, such as an image or audio file. The hidden message is typically only accessible to those who know the method of extraction or decryption. This technique is often used for covert communication or to protect sensitive information. Algebraic, trigonometric, and Orwellian do not involve the concealment of hidden messages within an external message.

Submit
10. In network security, what does the abbreviation "SSL" stand for?

Explanation

SSL stands for Secure Sockets Layer. It is a cryptographic protocol that provides secure communication over a computer network. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized parties. It is commonly used to secure online transactions, such as credit card payments, and to protect sensitive information, such as login credentials. SSL has been widely replaced by Transport Layer Security (TLS), but the term SSL is still commonly used to refer to the newer protocol versions as well.

Submit
11. 2009 saw the release of what new smartphone from Palm?

Explanation

In 2009, Palm released a new smartphone called the Pre.

Submit
12. What term, borrowed from warfare, describes a partially secure network outside a firewall?

Explanation

A DMZ, which stands for Demilitarized Zone, is a term borrowed from warfare that describes a partially secure network outside a firewall. In computer networking, a DMZ is a separate network segment that is used to host publicly accessible servers, such as web servers, while keeping them isolated from the internal network. This allows for an additional layer of security by placing a buffer zone between the internet and the internal network, reducing the risk of unauthorized access to sensitive information.

Submit
13. Which three-key cryptographic algorithm is used by the U.S. to encrypt non-classified data?

Explanation

Triple-DES is the correct answer because it is a three-key cryptographic algorithm that is commonly used by the U.S. to encrypt non-classified data. This algorithm applies the Data Encryption Standard (DES) algorithm three times to each data block, making it more secure than the original DES algorithm. Triple-DES provides a higher level of encryption and is widely adopted for securing sensitive information in various industries.

Submit
14. What kind of packet filtering considers delivery conditions and context?

Explanation

Stateful packet filtering considers delivery conditions and context. It examines the state of a connection by keeping track of the packets sent and received. This allows it to make more informed decisions about whether to allow or block packets based on the current state of the connection. Stateful packet filtering is able to take into account factors such as the source and destination IP addresses, ports, and the sequence and acknowledgment numbers of packets.

Submit
15. In VoIP, what term refers to the loss of speech-signal components, typically parts of words?

Explanation

Clipping is the term in VoIP that refers to the loss of speech-signal components, typically parts of words. This can occur when the signal level exceeds the maximum limit of the system, causing distortion and truncation of the audio waveform. It results in the speaker's voice sounding cut off or distorted, making it difficult to understand the speech.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Alfredhook3
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
When referred to in computer networking, what is "WLAN"?
What term refers to a set of programs used to access and gain admin...
In order to enhance security, TKIP encryption periodically changes...
What term refers to usually-public places for people to get wireless...
What network feature is used to make emergency calls over VoIP?
The RSA cryptography algorithm was invented by Ron Rivest, Adi Shamir...
A May, 2009 release of a new version of which Google browser promised...
What term applies to the designation of traffic type for a connection,...
What type of message has a hidden message encoded within the obvious...
In network security, what does the abbreviation "SSL" stand for?
2009 saw the release of what new smartphone from Palm?
What term, borrowed from warfare, describes a partially secure network...
Which three-key cryptographic algorithm is used by the U.S. to encrypt...
What kind of packet filtering considers delivery conditions and...
In VoIP, what term refers to the loss of speech-signal components,...
Alert!

Advertisement