Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Security and

Maintenance Quiz
Quiz No. 1

These are people who try to gain unauthorized


access to computer systems

A. Hackers
B. Teachers
C. Students
D. None of the choices
Quiz No. 2

The following are tips to create a strong password.


EXCEPT

A. Make your password easily guessable


B. Aim for passwords that are 12-16 characters long
C. Avoid using common words, phrases or easily
guessable information
D. None of the choices
Quiz No. 3

The following are best practices to keep your account


safe. EXCEPT

A. Never share your account information


B. Use the same password for all your accounts
C. Do not use the same password for all accounts
D If you accidentally share your logon information,
change it immediately
Quiz No. 4

It is a self-replicating program that consumes system


and network resources

A. Snake
B. Worm
C. Crab
D. Turtle
Quiz No. 5

It is a program designed to allow a hacker remote


access to a target computer system

A. Spyware
B. Worm
C. Trojan
D. Adware
Quiz No. 6

Is a software application that is designed


to secretly gather information from a computer or
mobile device and transmit it to a third party without
the user's consent

A. Hardware
B.Adware
C. Spyware
D. None of the choices
Quiz No. 7

Is a software application that automatically displays


or download advertisements

A.Shopee
B. Lazada
C. Amazon
D. Adware
Quiz No. 8

Is a small text file placed on your computer by a Web


browser

A. Cookies and Cream


B. Rocky Road
C. Graham
D. Cookie
Quiz No. 9

The following are example of a Public Computer.


EXCEPT

A. Personal Computer
B. Internet Cafés
C. Pisonet
D. None of the choices
Quiz No. 10

When using public computers, here are some things


to keep in mind. EXCEPT

A. Do not log out your account


B. Respect the rules and time limits set by the venue
for public use
C. Avoid saving files or personal data
D. Beware of Malware
Quiz No. 11

Browsing in _____________ can help protect your


privacy by not saving your browser history

A. Safari
B. Incognito Mode
C. Opera Mini
D. Mozilla Firefox
Quiz No. 12

Is a manipulative technique used by individuals or


groups to deceive or manipulate people into
divulging confidential information

A. Social Science
B. Social Engineering
C. Engineering and Mathematics
D. None of the choices
Quiz No. 13

Is the process of trying to gather sensitive


information such as a password, or credit card
details from an unsuspecting victim by pretending to
be a trustworthy entity

A. Fishing
B. Fish
C. Phishing
D. Pishing
Quiz No. 14

It generally refers to a software program designed to


detect prevent, and remove malicious software
commonly known as malware, from computer
systems.

A. Smadav
B. Antivirus
C. Avast
D. All of the above
Quiz No. 15

Is a network security device or software that


acts as a barrier between a trusted internal network
and untrusted external networks, such as the
internet.

A. Modem
B. Router
C. Firewall
D. None of the choices
Quiz No. 16

DPI stands for?

A. Deep Proxy Insection


B. Deep Proxy Inspection
C. Deep Packet Inspection
D. None of the choices
Quiz No. 17

HTTP stands for?

A. Hyper-text Transfer Protocol


B. Hypertext Transfer Protocol
C. Hyper-text Transfer Protocol
D. Hypertext Transfer Protocol
Quiz No. 18

HTTPs stands for?

A. Hyper-text Transfer Protocol Secured


B. Hypertext Transfer Protocol Secured
C. Hyper-text Transfer Protocol Secure
D. Hypertext Transfer Protocol Secure
Quiz No. 19

SSL stands for?

A. Secure Sockets Layer


B. Secured Sockets Layer
C. Secure Sockets Layout
D. Secured Sockets Layout
Quiz No. 20

TLS stands for?

A. Transport Layer Security


B. Transport Layer Secured
C. Transfer Layer Security
D. Transfer Layer Secured
Quiz No. 21

URL stands for?

A. Universal Resource Locator


B. Uniform Resource Locator
C.Uniform Resource Location
D. Universal Resource Location
Quiz No. 22

Websites using _________ display a padlock icon in


the address bar, indicating a secure connection

A. HTTP
B. HTTPs
C. HTML
D. None of the choices
Quiz No. 23

Websites using _________ display a pad-unlock icon


in the address bar, indicating that the connection is
not secure

A. Tkinter
B. HTML
C. HTTP
D. HTTPs
Quiz No. 24

This practice ensures that you can recover your


data in case of hardware failure, accidental
deletion, or other data loss events

A. Bake Up
B. Baking Up
C. Backing Up
D. None of the choice
Quiz No. 25

Is the process of identifying,


diagnosing, and resolving problems or issues in a
system, device, software, or process

A. Troubleshot
B. Troobleshoot
C. Troobleshooting
D. Troubleshooting

You might also like