Computer Security Free Certificate | Free Computer Certificate | Computer Security

Table of Contents

About the Quiz

* Attempt the Quiz only once .

* Score will be released only after closing of the quiz .

* If total marks scored is above 60% of the maximum marks , then E- certificate will be emailed immediately . Or in 2minutes

* Only 100 E – certificates will be emailed per day .

* Link to Apply / attempt the Quiz :

In computer security, ……………………. means that computer system assets can be modified only by authorized parities.*

Confidentiality

Integrity

Availability

Authenticity

A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.*

Worm

Virus

Zombie

Trap doors

The goal of __ is to reduce the exposure of the organization to malicious code.*

Access control.

Anti-virus

Password.

None of the above.

What does the “https” at the beginning of URL site mean*

That the site has been tampered with an should not be used

That the site is secure

That the site is an old version

That the site is sensitive

A computer checks the _ of user names and passwords for a match before granting access.*

Website

Network

Backup file

Data base

All of the following are examples of real security and privacy risks except?*

hackers

spam

viruses

identify theft

Verification of a login name and password is known as:*

configuration

accessibility

authentication

logging in

Firewalls are used to protect against*

unauthorized Attacks

virus Attacks

Data Driven Attacks

Fire Attacks

Now a days Phishing has become a criminal practice of using social engineering over which of the following ?*

Social networking sites

Mobile Phones

E-mail

Cyber cafes

Technology no longer protected by copyright, available to everyone, is considered to be:*

proprietary

open

experimental

in the public domain

Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:*

spyware

adware

spam

malware

A result of a computer virus can not lead to*

Disk Crash

Mother Board Crash

Corruption o f program

Deletion of files

All of the following are examples of real security and privacy risks Except*

hackers

spam

viruses

identify theft

Which of the following is not a risk in internet based transaction*

eavesdropping

spoofing

encryption

unauthorized action

A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is*

encryption

firewalls

digital certificates

digital signature

Apply Link

error: Content is protected !!
Scroll to Top