Chapter 12: Security Aspects

1 / 50

Cyber security aims to:

2 / 50

Patch update fixes:

3 / 50

Firewall types include:

4 / 50

VPN provides:

5 / 50

Which is safest?

6 / 50

Identity theft means:

7 / 50

Social engineering attacks target:

8 / 50

Keylogger records:

9 / 50

Botnet is used in:

10 / 50

Ethical hackers are:

11 / 50

Digital certificate is used in:

12 / 50

Encryption protects:

13 / 50

Browser warning appears for:

14 / 50

Which is more secure?

15 / 50

Cookies store:

16 / 50

Cookies are:

17 / 50

SSL is used for:

18 / 50

HTTPS uses:

19 / 50

HTTPS is:

20 / 50

HTTP stands for:

21 / 50

Which is NOT a prevention method?

22 / 50

Backup helps in:

23 / 50

Data encryption means:

24 / 50

Two-factor authentication uses:

25 / 50

Sandbox detection means:

26 / 50

Which is a safe practice?

27 / 50

Strong password should contain:

28 / 50

Firewall works at:

29 / 50

Signature-based detection requires:

30 / 50

Antivirus detects malware using:

31 / 50

Phishing is:

32 / 50

Crackers are:

33 / 50

Hackers are:

34 / 50

Spam refers to:

35 / 50

Eavesdropping refers to:

36 / 50

Snooping means:

37 / 50

DDoS attack uses:

38 / 50

DoS stands for:

39 / 50

Which malware hides inside legitimate software?

40 / 50

Which spreads without human action?

41 / 50

Firewall is used to:

42 / 50

Antivirus is used for:

43 / 50

Ransomware:

44 / 50

Spyware is used to:

45 / 50

Trojan horse is:

46 / 50

Worms spread:

47 / 50

A virus requires:

48 / 50

Which of the following is NOT malware?

49 / 50

Malware stands for:

50 / 50

What is computer security?

Your score is

The average score is 0%