02 Jul quiz cybersecurity
Question Description
Which of the following actions will you take to avoid or remove Spyware from your computer system?
Question 1 options:
Run a full scan on your computer with your anti-virus software
Run a legitimate product specifically designed to remove spyware.
Make sure that your anti-virus and anti-spyware software are compatible.
All the Above.
Question 2 (2 points)
Which one of the following is not harmful to your computer?
Question 2 options:
Hacker, attacker, or intrude
Malicious code
Vulnerability
Firewall
Question 3 (2 points)
Which of the following actions can maximize the chances of a user’s computer becoming infected by malware?
Question 3 options:
Enforcing the use of strong passwords
Employing firewalls, using malware detection programs
Avoiding opening e-mail attachments of unknown origin
Downloading of dubious programs
Question 4 (2 points)
Which of the following actions will NOT help you minimize the risk of other people accessing your information?
Question 4 options:
Lock the computer when one is away from it.
Disconnect the computer from the Internet when not in use
Disable Firewall setting when not in use
Evaluate your security settings.
Question 5 (2 points)
If you suspect that you’ve responded to a phishing scam with personal or financial information, which of the following step should be taken to minimize any damage and protect your identity?
Question 5 options:
Change the passwords or PINs on all your online accounts that you think might be compromised.
Place a fraud alert on your credit reports. Check with your bank or financial advisor if you’re not sure how to do this.
Contact the bank or the online merchant directly. But do not follow the link in the fraudulent email message.
All of the above
Question 6 (2 points)
What can you do to protect your privacy on a social network?
Question 6 options:
Limit the amount of personal information you post
Evaluate your settings
Check privacy policies
All of the above
Question 7 (2 points)
Cybersecurity involves protecting information by:
Question 7 options:
Preventing from attacks
Detecting the attacks
Responding to attacks
All of the above
Question 8 (2 points)
What are some of the examples of changes that could indicate that someone has accessed your information:
Question 8 options:
Unusual or unexplainable charges on your bills
Phone calls or bills for accounts, products, or services that you do not have
Failure to receive regular bills or mail
New, strange accounts appearing on your credit report
All of the above
Question 9 (2 points)
Which of the following should you not do on a social network?
Question 9 options:
Use proper spelling.
Keep your posts short.
Accept all friend requests.
.
Include links to other sites
Question 10 (2 points)
Why can email attachments be dangerous?
Question 10 options:
Forwarding emails can infect many machines.
Attackers have more freedom with the types of viruses they can send by email attachment.
Option of automatically downloading email attachments can expose the computers to any viruses.
All of the above
Question 11 (2 points)
Which of the following are potential hazards faced by social networkers
Question 11 options:
Physical stalking
Robbery
Identity theft,
Spam and computer viruses
All of the above
Question 12 (2 points)
A Trojan (or Trojan horse) is a malicious program that pretends to be a benign application. It is designed to cause your computer to do something that is unexpected. Since it does not spread (not self-replicating) it is not really a virus.
Question 12 options:
TRUE
FALSE
Question 13 (2 points)
Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, Trojans, backdoors, spyware, rootkits and spam.
Question 13 options:
TRUE
FALSE
Question 14 (2 points)
Spyware can make changes to your computer that can be annoying and can cause your computer slow down or crash.
Question 14 options:
TRUE
FALSE
Question 15 (2 points)
Once software is installed on your computer, you do not have to worry about it anymore.
Question 15 options:
TRUE
FALSE
Question 16 (1 point)
Using anti-virus and anti-spyware software is not an important part of cyber security
Question 16 options:
TRUE
FALSE
Question 17 (1 point)
Screen scraping is the act of taking all the information that a person has posted on their Web site or social networking page.
Question 17 options:
TRUE
FALSE
Question 18 (1 point)
Most social networks have a variety of privacy settings you can configure to hide some or all of your personal information from some or all of the site’s members
Question 18 options:
TRUE
FALSE
Question 19 (1 point)
Computer viruses and Trojan Horses are the two most common forms of Malware.
Question 19 options:
TRUE
FALSE
Question 20 (3 points)
To create strong passwords include using:
Question 20 options:
Alphabetic characters
Numeric Characters
Special characters
All of the above
Question 21 (2 points)
Social Networking provides several different ways for people to communicate with one another, including through personal web pages with photos and video, blogs, message boards, and instant messaging features.
Question 21 options:
TRUE
FALSE
Question 22 (3 points)
___________ are small software programs that are designed to spread from one computer to another and to interfere with computer operation
Question 22 options:
Spam
Computer Viruses
Question 23 (3 points)
________ is the electronic version of “junk mail.”
Question 23 options:
Virus
Phishing
Friending
Spam
Question 24 (2 points)
Phishing is an attempt to get information such as passwords, user names, and financial details by masquerading as a trusted source, using some form of electronic communication. Often the imposter poses as a trusted source from popular social websites, banks, or government agencies
Question 24 options:
TRUE
FALSE
Question 25 (3 points)
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
