Preview

02 - Cyber Security threats - dangers online

 1. There are a number of malicious software (‘____________’) programs that can cause damage to computers.
These include viruses, worms, zombies, Trojan horses (Trojans) and Spybots.

  hardware

  malware

  jackerware

  cyberware

 2. Malicious software attacks can be detected and blocked by the use of:

  Hackerified Software

  Fired Monitors

  Anti Virus Software

  Protected Mice

 3. Examples of Anti Virus Software include:

  McAFEE

  Sophos

  AVAST

  All of the above are valid Anti virus software - there are hundreds, if not thousands

 4. Most operating systems include a firewall. A firewall is software that will ….

  block all anti virus software installed on the machine

  block unexpected connections coming in to the network.

  allow unexpected connections coming in to the network

  block all expected connections coming in to the network

 5. When more than one person uses a network it is important to have ……..

  user IDs and passwords

  separate monitors with inbuilt anti-hacking hardware in the screen

  mock networks

  network mice for each user

 6. You make an easy target if your password is weak. A good password should have a mix:

  of numbers only

  of humour and seriousness

  of text characters A to C only, avoiding the later letters of the alphabet

  of upper case and lower case letters, numbers and special characters.

 7. Another type of threat has to do with _____________ levels. Only a network manager, for instance, may have the highest level of _____.

  final

  built in

  access

  firewall

 8. Any message sent over a network can be intercepted. _____________ is a method of changing the original numbers and characters so that they are disguised

  Asymmetric Attribution

  Cryption

  Encryption

  Securitition

 9. In the ____________each letter of the alphabet is simply replaced by another letter in the alphabet that might be one or more letter positions away

  Anime Cipher

  Bello Cipher

  Turing Cipher

  Caesar Cipher

 10. Hackers could steal unencrypted information on a site that has a web address that is …
Note: Do watch all the videos in this quiz, if at all possible

  www instead of wwws

  url instead of urls

  http instead of https

  https instead of http