Chapter 12: Security Aspects
1 / 50
Cyber security aims to:
2 / 50
Patch update fixes:
3 / 50
Firewall types include:
4 / 50
VPN provides:
5 / 50
Which is safest?
6 / 50
Identity theft means:
7 / 50
Social engineering attacks target:
8 / 50
Keylogger records:
9 / 50
Botnet is used in:
10 / 50
Ethical hackers are:
11 / 50
Digital certificate is used in:
12 / 50
Encryption protects:
13 / 50
Browser warning appears for:
14 / 50
Which is more secure?
15 / 50
Cookies store:
16 / 50
Cookies are:
17 / 50
SSL is used for:
18 / 50
HTTPS uses:
19 / 50
HTTPS is:
20 / 50
HTTP stands for:
21 / 50
Which is NOT a prevention method?
22 / 50
Backup helps in:
23 / 50
Data encryption means:
24 / 50
Two-factor authentication uses:
25 / 50
Sandbox detection means:
26 / 50
Which is a safe practice?
27 / 50
Strong password should contain:
28 / 50
Firewall works at:
29 / 50
Signature-based detection requires:
30 / 50
Antivirus detects malware using:
31 / 50
Phishing is:
32 / 50
Crackers are:
33 / 50
Hackers are:
34 / 50
Spam refers to:
35 / 50
Eavesdropping refers to:
36 / 50
Snooping means:
37 / 50
DDoS attack uses:
38 / 50
DoS stands for:
39 / 50
Which malware hides inside legitimate software?
40 / 50
Which spreads without human action?
41 / 50
Firewall is used to:
42 / 50
Antivirus is used for:
43 / 50
Ransomware:
44 / 50
Spyware is used to:
45 / 50
Trojan horse is:
46 / 50
Worms spread:
47 / 50
A virus requires:
48 / 50
Which of the following is NOT malware?
49 / 50
Malware stands for:
50 / 50
What is computer security?
Your score is
The average score is 0%