Computer Security/IT security/Cybersecurity Quiz with answers – Part 5
If a word is made up of a complex series of numbers, letters and symbols without any meaning, what is it a good candidate for?
A domain name
A file name
For a computer system, what is the procedure for authenticating a user?
Check the identity of the user before giving him access to resources (systems, networks, applications ...)
Establish a correspondence between the username entered by the user and his real name
Ask the user who wants to change their password a second time
Keep track of the user's visit to the system (identifier, dates and times of connection and disconnection, ...)
Which properties should have a secure password ?
Be easy to remember (first name, date of birth, ...)
Be listed in a dictionary of the usual language
Be more than 7 characters
Be disseminated to those around you
Be made up of letters and numbers with no meaning
Which of the following passwords are the most secure?
What is phishing?
A network traffic analysis technique
A method of finding information on the Internet
A system for sending massive e-mails
A data collection procedure using a secure form
A fraudulent process for collecting personal information
How phishing works ?
send email to multiple people
establish a link between two correspondents
obtain personal information for fraudulent purposes
How do you call in computer a program which is characterized by its destructive aspect without the knowledge of the user ?
Which of the following terms refer to malware ?
A Trojan horse
An electronic hoax
In terms of IT security, what do we mean by a Trojan horse ?
Malware that spreads via email by exploiting email vulnerabilities
Malware that looks like harmless software but has harmful instructions that run after the software is installed
Malicious email that sends itself to addresses in the entire address book of the computer on which it is located
Malware that discreetly installs on the computer and collects and sends personal information to third parties
Share the quiz to show your results !
Subscribe to see your results
Computer security Quiz – Part 5
I got %%score%% of %%total%% right