Internet Security Quizzes & Trivia
Top Trending
Questions: 10 | Attempts: 16296 | Last updated: Oct 15, 2020
Questions: 10 | Attempts: 3817 | Last updated: Sep 1, 2020
Questions: 11 | Attempts: 1199 | Last updated: Dec 23, 2020
Questions: 5 | Attempts: 934 | Last updated: Nov 5, 2012
Questions: 10 | Attempts: 682 | Last updated: Aug 26, 2020
What makes a strong password? How long would it take an intruder to crack a 10 character password? And How many times can I use a super strong password?Think you know the answers? Find out here!
Questions: 10 | Attempts: 16296 | Last updated: Oct 15, 2020
-
Sample QuestionWhich of the following is the most commonly used (and therefore the weakest) password?
Questions: 10 | Attempts: 3817 | Last updated: Sep 1, 2020
-
Sample QuestionThis technique tries to take information from the user, but the user actively gave the information. Common things taken are credit cards, usernames, passwords, and home addresses.
.
Questions: 11 | Attempts: 1199 | Last updated: Dec 23, 2020
-
Sample QuestionWhich of the following is the definition of a computer worm?
Questions: 5 | Attempts: 934 | Last updated: Nov 5, 2012
-
Sample QuestionWhat type of things posted online can affect your future? Click all answers that apply.
Questions: 10 | Attempts: 682 | Last updated: Aug 26, 2020
-
Sample QuestionWhen traveling for business:
Advertisement
Advertisement

Internet Security Questions & Answers
What is the tracking number used in?
Tracking numbers are used when it comes to shipping. When packages are being shipped, the packages would be assigned numbers for the purpose of recognition. There are some deliveries that are really time-sensitive, and tracking numbers help in knowin
What is the most commonly used (and therefore the weakest) password?
123456According to recent analysis 123456 is the most commonly used password[1], however; these passwords all appear on Twitters list of 370 banned passwords[2] and should be avoided at all costs! Common passwords are amongst the first passwords to b
What can you do to avoid forgetting the strong passwords as they can be difficult to remember?
All of the above-all of these techniques can be used to create a strong password.
mnemonics can be used to make your password easy to remember (e.g. condense a rude phrase or a funny joke into a string of letters, add numbers and symbols, etc.)
Are password Reminder functions in applications unsafe and should be avoided?
More
FalsePassword hints and reminders can help to jog your memory and help to avoid creating another password.
If you can create your own password hint make sure it only makes sense to you. It should never contain your password.
If you use a serv
Questions: 10 | Attempts: 319 | Last updated: Sep 1, 2020
-
Sample QuestionWhat is one of the signs to show you that malware is on your computer?
Securing Communication & other Infrastructure
Questions: 29 | Attempts: 298 | Last updated: Dec 11, 2012
-
Sample QuestionWhich of the following is the most popular protocol that is used in dial-up connections?
Questions: 6 | Attempts: 250 | Last updated: May 17, 2014
-
Sample QuestionThe unstructured file data that makes up 80% of corporate data is expected to grow how much in the next 5 years?
Quiz Mata kuliah Internet & Mobile Security (Mid Semester)
Jurusan : Manajemen Informatika
SKS : 3 sks. Total database pertanyaan: 37 soal.
Sistem random soal dan jawaban.
Waktu menjawab: 15 menit
Questions: 37 | Attempts: 229 | Last updated: Dec 9, 2016
-
Sample QuestionUsaha pencegahan dilakukan agar sistem informasi tidak memiliki lubang keamanan adalah …
This a quiz to test your computer knowledge about malware, spyware,phishing,identity theft and spam/email scams.
Questions: 10 | Attempts: 175 | Last updated: Dec 9, 2016
-
Sample QuestionWhen you are using your facebook account, a message pop-out, it tells you to click on the link and you can get a iphone if you win the game. What would you do?
Mata kuliah : Internet & Mobile Security
Semester : VI
Jurusan : Manajemen Informatika
SKS : 3 sks
Akhir Semester
Total soal: 44 soal (Random soal dan jawaban)
Questions: 44 | Attempts: 174 | Last updated: Jan 21, 2014
-
Sample QuestionTeknologi yang digunakan sebelum generasi 4G adalah ….
I am a Computer Science major and I have studied and experienced much that our internet technologies entail. Since most individuals, schools, business, and governments are becoming more dependent on the technology of internet, it...
Questions: 14 | Attempts: 155 | Last updated: Apr 6, 2015
-
Sample QuestionTrue or False, P2P (peer-to-peer) downloading of textbooks is legal.
What do you know about internet security? This quiz will reveal your knowledge. Internet security is a term for a broader issue covering security for transactions over the internet, browser security, the security information...
Questions: 15 | Attempts: 91 | Last updated: Nov 25, 2020
-
Sample QuestionWhat is Identity Theft?
A quiz to test the intelligence of students when it comes to internet safety and security.
Questions: 10 | Attempts: 84 | Last updated: Jan 24, 2013
-
Sample QuestionWhile playing your favorite online game, a small window pops up. It tells you that you are the 100,000th visitor of the website, and you have won a free Wii console. All it needs is your street address and your phone number. What do you do?
Below is a short Network security test that is perfect for all of us who use computers on a regular basis. It is very easy for someone to get the information through a computer, and that being said, there are different ways that...
Questions: 5 | Attempts: 47 | Last updated: Sep 23, 2019
-
Sample QuestionWhat offers protection for an individual system, not a network?
A quiz to check your basic internet knowledge.
Questions: 5 | Attempts: 39 | Last updated: Jan 23, 2013
-
Sample QuestionWhat does WEP stand for in terms of network security?
Ineternet Security Quiz
Questions: 10 | Attempts: 35 | Last updated: Jan 24, 2013
-
Sample QuestionIs anti-malware software effective?
How Internet Security Fights Off PC Invaders
Questions: 13 | Attempts: 28 | Last updated: Jan 24, 2013
-
Sample QuestionWhat is a virus?
Take pre-cautionary measures to protect yourself from Social Media Crimes, Phishing, and Job Scam.
Questions: 5 | Attempts: 26 | Last updated: Jan 7, 2013
-
Sample QuestionWhich of the three articles is this paragraph derived from: "Many Internet security experts consider the first virus attack on the PC to have occurred in 1986. By the early 1990s, viruses transmitted on floppy disks became ubiquitous. When the World Wide Web became widely available that same decade, viruses, worms and malware became problems in e-mail accounts, frustrating users who clicked on messages thought to be legitimate."
Tough act balancing data privacy with convenience of technology convergence. Take the first Data Privacy Asia 2015 quiz to find out more about the related facts and figures of data privacy.
Questions: 5 | Attempts: 23 | Last updated: May 9, 2017
-
Sample QuestionWhat percentage of ASEAN countries have enacted overarching data protection laws?
This quiz is meant to challenge you when you are faced with a internet security challenge.
Questions: 10 | Attempts: 17 | Last updated: Jan 24, 2013
-
Sample QuestionYou recieve an email from a person you do not know, that asks you if you would like to sign up to there website(in the subject). What do you do.
How much do you know about data privacy? Take this quiz and prove yourself now!
Questions: 5 | Attempts: 15 | Last updated: May 9, 2017
-
Sample QuestionWhat percentage of ASEAN countries have enacted overarching data protection laws?
This quiz is meant to test the knowledge of others about internet security.
Questions: 18 | Attempts: 14 | Last updated: Nov 22, 2017
-
Sample QuestionFill in the blank with the best answer choice below. To protect yourself from identity theft, place a _________ on your credit reports.
When you are willing to buy a very good or use some information, you need to have some levels of assurance on its authenticity and effectiveness. If you consider something to be risky, you will require high levels of assurance....
Questions: 16 | Attempts: 13 | Last updated: Jul 15, 2019
-
Sample QuestionPIV is abbreviated for?
This quiz is meant to test your knowledge on phishing, spyware, malware, identity theft and spam/email scams.
Questions: 10 | Attempts: 13 | Last updated: Jan 24, 2013
-
Sample QuestionWhat is "malware" short for?