Computer Security

Computer Security Quiz with answers – Part 5

Computer Security/IT security/Cybersecurity Quiz with answers – Part 5

Test your knowledge in Computer Security with interactive Quiz in networks, internet, IT security, attacks and intrusions Quiz, defenses, technical measures, and cryptography.

If a word is made up of a complex series of numbers, letters and symbols without any meaning, what is it a good candidate for?
A password
An E-mail
A domain name
A file name
A login
For a computer system, what is the procedure for authenticating a user?
Check the identity of the user before giving him access to resources (systems, networks, applications ...)
Establish a correspondence between the username entered by the user and his real name
Ask the user who wants to change their password a second time
Keep track of the user's visit to the system (identifier, dates and times of connection and disconnection, ...)

Correct!

Wrong!

Which properties should have a secure password ?
Be easy to remember (first name, date of birth, ...)
Be listed in a dictionary of the usual language
Be more than 7 characters
Be disseminated to those around you
Be made up of letters and numbers with no meaning

Correct!

Wrong!

Which of the following passwords are the most secure?
caroline
24031988
UV67!rvO
r78ww23X
password

Correct!

Wrong!

What is phishing?
A network traffic analysis technique
A method of finding information on the Internet
A system for sending massive e-mails
A data collection procedure using a secure form
A fraudulent process for collecting personal information

Correct!

Wrong!

How phishing works ?
send email to multiple people
establish a link between two correspondents
obtain personal information for fraudulent purposes
attract customers

Correct!

Wrong!

How do you call in computer a program which is characterized by its destructive aspect without the knowledge of the user ?
A hoax
A virus
A port
A bug
A ghost

Correct!

Wrong!

Which of the following terms refer to malware ?
A Trojan horse
An electronic hoax
A virus
Spyware
A bug

Correct!

Wrong!

In terms of IT security, what do we mean by a Trojan horse ?
Malware that spreads via email by exploiting email vulnerabilities
Malware that looks like harmless software but has harmful instructions that run after the software is installed
Malicious email that sends itself to addresses in the entire address book of the computer on which it is located
Malware that discreetly installs on the computer and collects and sends personal information to third parties

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

Computer security Quiz – Part 5

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button