Computer Network Risks and Virus Threats Quiz

ConsummateEnglishHorn avatar
ConsummateEnglishHorn
·
·
Download

Start Quiz

Study Flashcards

10 Questions

Viruses can be transferred via: Email attachments, Program or file downloads, Using infected disks, CDs, or flash drives

worms

A ______s: is a self-replicating program that consumes system and network resources

worm

Malware: ______: gathers personal or private information without your consent or knowledge.

Spyware

A cookie: is a small text file and not dangers but, store user names, passwords and browser activities.

dangerous

Phishing: is the process of trying to gather sensitive information by e-mail includes link.

phishing

Strong ______ protect your accounts. Use a minimum of six characters; eight or more characters is even better, with 15 characters considered the most secure. Include a mixture of numbers, letters, symbols and capital letters. Select one that will be easy to remember, but difficult for someone else to guess. Avoid using variations of your name, names of people close to you, address, or birthdate. If you accidentally share your password, change it immediately. Do not “hide” your password near your computer. Do not use the same password for all your accounts.

passwords

When an antivirus program is running, it will scan the files you select; when it finds a virus or threat, it will give you the option Quarantine: place the infected file in a quarantined or vault area where it cannot infect other files. Remove: delete infected file from your system permanently.

antivirus software

A ______ is a security barrier that filters and controls the flow of information coming into and out of a private network. The filters used by ______s are simply sets of rules that define and control which type of traffic to allow and which type of traffic to block.

firewall

While browsing the Internet, the Address bar in your browser uses the Hypertext Transfer Protocol (http). To conduct secure transactions over the Internet, web servers use Hypertext Transfer Protocol Secure (______) to encrypt all exchanges between your computer and the web server. Encryption, which is the process of converting data into an unreadable form. The ______ protocol and a lock icon in the Address bar indicate that you are in a secure area of the vendor’s web site and that transactions can be conducted safely.

https

A ______: is a duplicate copy of a program, a disk, or data to protect from loss if the active copy is damaged or destroyed. Backups should be written on a storage medium other than the source of the ______.

backup

Test your knowledge about the risks of connecting a computer to a network and the potential threats posed by hackers and viruses. Learn about the ways in which viruses can spread and the potential impact on a computer's operations and data.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Network Topology Quiz
10 questions

Computer Network Topology Quiz

PatientEvergreenForest avatar
PatientEvergreenForest
Computer Network Basics Quiz
26 questions
Types of Computer Viruses Quiz
10 questions
Use Quizgecko on...
Browser
Browser