Internet Security Quiz
Show all answers
Hide all answers
Completion
- DoS stands for _____________ _____________ _____________.
Answer
Denial of Service
- DDoS stands for _____________ _____________ _____________ _____________.
Answer
Distributed Denial of Service
- DRM stands for _____________ _____________ _____________.
Answer
Digital Rights Management
- DMCA stands for _____________ _____________ _____________ _____________.
Answer
Digital Millenium Copyright Act
Short answer
- What is a cookie?
Answer
A cookie is a small text file that a website can store on your
computer to identify you the next time you visit.
- What does the term authentication mean?
Answer
Authentication is the process of verifying the identity
of a user who is accessing a system.
- What is adware?
Answer
Adware is software that displays advertisements to the user. It is
often discounted or free if the user allows the ads, but the user can often pay for
a version of the software which is ad-free.
- What is spyware?
Answer
Spyware is software that records the activities of a user on their
computer and then sends it to someone remotely over the Internet.
- What is the purpose of a firewall?
Answer
A firewall prevents unauthorized messages from getting into
or out of a network or device.
- What is a script kiddie?
Answer
A script kiddie is someone who doesn't know computers in great
detail, but still manages to attack computers using freely available tools
from the Internet.
- Describe what a packet sniffer is.
Answer
A packet sniffer examines the contents of data travelling
through a network.
- Describe the difference between a worm and a virus.
Answer
A worm spreads on its own over a network without
human intervention.
- Describe the difference between private key and public key encryption.
Answer
Private key encryption uses the same key for both encryption and
decryption and that key must be kept private. Public key encryption uses different
keys for encryption and decryption. The encryption key is made public, but the
decryption key is kept private.
- How are private key and symmetric encryption related?
Answer
They are synonyms. They require only a single key for both
encryption and decryption and that key must be kept private.
- How are public key and asymmetric encryption related?
Answer
They are synonyms. They require separate keys for encryption
and decryption. The encryption key is made public, but the decryption key
must be kept private.
- What is plain text?
Answer
A readable message before it is encrypted.
- What is cipher text?
Answer
A message after it is encrypted.
- What is steganography?
Answer
Steganography is the art of placing hidden messages within image files.
- Describe the difference between physical and logical security measures.
Answer
Physical security measures involve physical barriers and tools such
as fences, locked doors, walls, and fire extinguishers. Logical security measures
involve less concrete measures such as logins, passwords, and biometric features.
- What does the term zombie refer to?
Answer
A zombie is a machine which has been infected and can be controlled remotely
without the knowledge or consent of the user.
- What does the term keylogger refer to?
Answer
A keylogger records keystrokes and may send them to a remote computer.
- Describe what typosquatting is.
Answer
Typosquatting is when people obtain a domain name that is similar
to a respected domain name, but spelled slightly different. The hope is to catch
people who type in a URL incorrectly.
Matching
Identify the letter of the choice that best matches the phrase or definition.
- spoofing
- virus
- trojan
- worm
- phishing
- pharming
- malware
- man-in-the-middle
- steganography
- rootkit
- code (generally malicious) that can spread itself over a network without human intervention
Answer
D (worm)
- an attacker intercepts and relays information between the intended sender and receiver
Answer
H (man-in-the-middle)
- faking who a message is really from
Answer
A (spoofing)
- code (generally malicious) that spreads when a file is opened or a program is executed
Answer
B (virus)
- an umbrella term for any type of software threat
Answer
G (malware)
- code (generally malicious) hidden inside a seemingly useful program
Answer
C (trojan)
- an attempt to get confidential information such as account numbers and passwords by pretending to be a trusted organization, usually
by using fake emails
Answer
E (phishing)
- redirects a website's traffic to a malicious website
Answer
F (pharming)
- parts of the operating system are replaced by malicious code
Answer
J (rootkit)
- hiding messages within pictures, videos, etc.
Answer
I (steganography)