About the Quiz
* Attempt the Quiz only once .
* Score will be released only after closing of the quiz .
* If total marks scored is above 60% of the maximum marks , then E- certificate will be emailed immediately . Or in 2minutes
* Only 100 E – certificates will be emailed per day .
* Link to Apply / attempt the Quiz :
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.*
Confidentiality
Integrity
Availability
Authenticity
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.*
Worm
Virus
Zombie
Trap doors
The goal of __ is to reduce the exposure of the organization to malicious code.*
Access control.
Anti-virus
Password.
None of the above.
What does the “https” at the beginning of URL site mean*
That the site has been tampered with an should not be used
That the site is secure
That the site is an old version
That the site is sensitive
A computer checks the _ of user names and passwords for a match before granting access.*
Website
Network
Backup file
Data base
All of the following are examples of real security and privacy risks except?*
hackers
spam
viruses
identify theft
Verification of a login name and password is known as:*
configuration
accessibility
authentication
logging in
Firewalls are used to protect against*
unauthorized Attacks
virus Attacks
Data Driven Attacks
Fire Attacks
Now a days Phishing has become a criminal practice of using social engineering over which of the following ?*
Social networking sites
Mobile Phones
Cyber cafes
Technology no longer protected by copyright, available to everyone, is considered to be:*
proprietary
open
experimental
in the public domain
Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:*
spyware
adware
spam
malware
A result of a computer virus can not lead to*
Disk Crash
Mother Board Crash
Corruption o f program
Deletion of files
All of the following are examples of real security and privacy risks Except*
hackers
spam
viruses
identify theft
Which of the following is not a risk in internet based transaction*
eavesdropping
spoofing
encryption
unauthorized action
A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is*
encryption
firewalls
digital certificates
digital signature