Internet Security Quiz

Show all answers     Hide all answers

    Completion

  1. DoS stands for _____________   _____________   _____________. Answer Denial of Service
  2. DDoS stands for _____________   _____________   _____________   _____________. Answer Distributed Denial of Service
  3. DRM stands for _____________   _____________   _____________. Answer Digital Rights Management
  4. DMCA stands for _____________   _____________   _____________   _____________. Answer Digital Millenium Copyright Act
  5. Short answer

  6. What is a cookie? Answer A cookie is a small text file that a website can store on your computer to identify you the next time you visit.
  7. What does the term authentication mean? Answer Authentication is the process of verifying the identity of a user who is accessing a system.
  8. What is adware? Answer Adware is software that displays advertisements to the user. It is often discounted or free if the user allows the ads, but the user can often pay for a version of the software which is ad-free.
  9. What is spyware? Answer Spyware is software that records the activities of a user on their computer and then sends it to someone remotely over the Internet.
  10. What is the purpose of a firewall? Answer A firewall prevents unauthorized messages from getting into or out of a network or device.
  11. What is a script kiddie? Answer A script kiddie is someone who doesn't know computers in great detail, but still manages to attack computers using freely available tools from the Internet.
  12. Describe what a packet sniffer is. Answer A packet sniffer examines the contents of data travelling through a network.
  13. Describe the difference between a worm and a virus. Answer A worm spreads on its own over a network without human intervention.
  14. Describe the difference between private key and public key encryption. Answer Private key encryption uses the same key for both encryption and decryption and that key must be kept private. Public key encryption uses different keys for encryption and decryption. The encryption key is made public, but the decryption key is kept private.
  15. How are private key and symmetric encryption related? Answer They are synonyms. They require only a single key for both encryption and decryption and that key must be kept private.
  16. How are public key and asymmetric encryption related? Answer They are synonyms. They require separate keys for encryption and decryption. The encryption key is made public, but the decryption key must be kept private.
  17. What is plain text? Answer A readable message before it is encrypted.
  18. What is cipher text? Answer A message after it is encrypted.
  19. What is steganography? Answer Steganography is the art of placing hidden messages within image files.
  20. Describe the difference between physical and logical security measures. Answer Physical security measures involve physical barriers and tools such as fences, locked doors, walls, and fire extinguishers. Logical security measures involve less concrete measures such as logins, passwords, and biometric features.
  21. What does the term zombie refer to? Answer A zombie is a machine which has been infected and can be controlled remotely without the knowledge or consent of the user.
  22. What does the term keylogger refer to? Answer A keylogger records keystrokes and may send them to a remote computer.
  23. Describe what typosquatting is. Answer Typosquatting is when people obtain a domain name that is similar to a respected domain name, but spelled slightly different. The hope is to catch people who type in a URL incorrectly.
  24. Matching

    Identify the letter of the choice that best matches the phrase or definition.

    1. spoofing
    2. virus
    3. trojan
    4. worm
    5. phishing
    6. pharming
    7. malware
    8. man-in-the-middle
    9. steganography
    10. rootkit
  25. code (generally malicious) that can spread itself over a network without human intervention Answer D (worm)
  26. an attacker intercepts and relays information between the intended sender and receiver Answer H (man-in-the-middle)
  27. faking who a message is really from Answer A (spoofing)
  28. code (generally malicious) that spreads when a file is opened or a program is executed Answer B (virus)
  29. an umbrella term for any type of software threat Answer G (malware)
  30. code (generally malicious) hidden inside a seemingly useful program Answer C (trojan)
  31. an attempt to get confidential information such as account numbers and passwords by pretending to be a trusted organization, usually by using fake emails Answer E (phishing)
  32. redirects a website's traffic to a malicious website Answer F (pharming)
  33. parts of the operating system are replaced by malicious code Answer J (rootkit)
  34. hiding messages within pictures, videos, etc. Answer I (steganography)