Quiz about Basic Computer Security
Quiz about Basic Computer Security

Basic Computer Security Trivia Quiz


This quiz is designed to test your understanding of basic computer security aspects as well as a little history.

A multiple-choice quiz by Codelock. Estimated time: 4 mins.
  1. Home
  2. »
  3. Quizzes
  4. »
  5. Science Trivia
  6. »
  7. Computers
  8. »
  9. General Computing

Author
Codelock
Time
4 mins
Type
Multiple Choice
Quiz #
186,970
Updated
Dec 03 21
# Qns
10
Difficulty
Average
Avg Score
6 / 10
Plays
6223
Last 3 plays: Guest 205 (7/10), Crzygl (0/10), Guest 157 (0/10).
This quiz has 2 formats: you can play it as a or as shown below.
Scroll down to the bottom for the answer key.
1. McAfee, the internet security company, became a subsidiary of which of these in 2011? Hint

Intel
Microsoft
Dell
IBM

2. Which of the following types of attacks do hackers use to gain information from you without the use of specialized computer programs? Hint

ARP Poisoning
SQL Injection
Cross Site Scripting
Social Engineering

3. Which of these services was originally designed for network administrators to work remotely on different computers in their network but is now mostly used by malicious hackers? Hint

SMTP
Telnet
POP3
ICMP

4. Which of the following isn't a type of hacker? Hint

Grey Hat Hackers
White Hat Hackers
Black Hat Hackers
Brown Hat Hackers

5. On most home computers, how often should you update your operating system and security software? Hint

At least once a week
Three times a week
Once a month
You don't need to update your system

6. Which of the following software programs would not help you in protecting your computer? Hint

Napster
Norton AntiVirus
Sygate Personal Firewall
Microsoft Baseline Security Analyzer

7. Which of the following software programs' main function is typically to enable an attacker to have a complete control of their victim's PC? Hint

A computer virus
A Trojan horse
A computer worm
AGP Accelerated Port

8. Is encryption of your data an unnecessary security precaution that can be ignored?

Yes
No

9. The Morris worm, which was the first worm to spread in the wild extensively, was originally written not to cause damage, although due to the bugs that were found in its code, it caused so much damage on the Internet that it was also referred to as the "Great Worm."

Yes
No

10. Computer worms, viruses, as well as Trojans are generally grouped into one big group. What is this group called?

Answer: (Think "evil" (seven letters))

(Optional) Create a Free FunTrivia ID to save the points you are about to earn:

arrow Select a User ID:
arrow Choose a Password:
arrow Your Email:




Quiz Answer Key and Fun Facts
1. McAfee, the internet security company, became a subsidiary of which of these in 2011?

Answer: Intel

McAfee was established in 1987, and swallowed up several other security companies itself, before being taken over by Intel. Its symbol of a white shield on a red background is instantly recognizable.
2. Which of the following types of attacks do hackers use to gain information from you without the use of specialized computer programs?

Answer: Social Engineering

Believe it or not, it is possible for skilled hackers to gain important information from you without using specially programmed software. This type of attack is called Social Engineering, and it is basically a situation in which the hacker tries to gain your trust and then uses that trust against you.

A great example of a Social Engineering attack took place in the movie "Hackers", when the main character called up the security guy in the TV company, and pretended to be a student whose computer just crashed. By doing this, he eventually managed to get the modem number that he needed.
3. Which of these services was originally designed for network administrators to work remotely on different computers in their network but is now mostly used by malicious hackers?

Answer: Telnet

Telnet is a specialized service which was originally used by network administrators, although these days, there are many other uses for it, such as connecting to a web-server and spoofing (providing fake) information about yourself. I will also give you a short description of the other services:

SMTP (Simple Mail Transfer Protocol): This service basically allows you to send outgoing emails.

POP3 (Post Office Protocol Version 3): This service allows you to receive emails.

ICMP (Internet Control Message Protocol): This service allows you to perform various functions, such as checking if a host is alive.
4. Which of the following isn't a type of hacker?

Answer: Brown Hat Hackers

Thanks to the media, it is a common belief that a hacker is someone who gets into a computer system and deletes everything that he can get his hands on. This, however, isn't an accurate statement. These types of hackers do exist, but there are also other types, which are totally different:

White Hat Hackers are hackers that use their skills for good. This means that if they find a security hole in a system, they contact the administrator and let them know about it, or even help them in fixing it.

Grey Hat Hackers are types of hackers that are not good, but then again, they are not always bad. When they get into a system, they may not delete anything at all, while other times, they may produce a great amount of damage.

Black Hat hackers are the types of hackers that I previously discussed. They usually get into unauthorized computer systems and cause great amounts of damage. These hackers are the most dangerous ones.
5. On most home computers, how often should you update your operating system and security software?

Answer: At least once a week

Many people live under the impression that once they buy their computer, they are finished. In other words, they think that they don't have to "take care of it." Unfortunately, this belief has caused many people to have their systems invaded. Basically, updating your system, no matter if it is Linux or Mac, means providing it with the latest patches, which may perform various functions such as patching security holes, adding more stability, etc.

It is recommended that you update your system at least once a week, although you can also set up the system to update itself automatically.
6. Which of the following software programs would not help you in protecting your computer?

Answer: Napster

In order to make the process of protecting your computer easier, various computer companies, as well as independent programmers, have designed various computer programs that aid you when dealing with security issues. Let's go over the choices that we have here.

A firewall monitors all of the "things" that go in and out of our computer, which is a VERY essential function if we have a constant internet connection. Norton AntiVirus checks for viruses on our computer, which helps us in preventing data loss, and MBSA checks our system for the most common security holes, so that we are aware of the holes in our system. Unlike the previously mentioned software programs though, Napster is simply a file sharing program, which doesn't add any layer of protection to our computer.

In fact, it can even lead to many other security issues.
7. Which of the following software programs' main function is typically to enable an attacker to have a complete control of their victim's PC?

Answer: A Trojan horse

A Trojan horse is a specialized type of software that would enable a malicious hacker to completely take over their victim's computer, as if they were sitting in front of the computer itself. Luckily, there are many types of specialized scanners that scan your system and try to detect this software.

The other choices, especially the virus and the worm, may cause damage on your computer, but they do not enable an attacker to take it over.
8. Is encryption of your data an unnecessary security precaution that can be ignored?

Answer: No

With today's tools and possibilities, encryption is becoming a very popular method to add an extra layer of security to your computer. In easy words, encryption is a process in which you make the chosen data unreadable by a normal person without the proper key.

The process of encrypting your data isn't a very complicated one, although there are many other advanced options, which can make the encryption process a lot more rewarding, but more difficult.
9. The Morris worm, which was the first worm to spread in the wild extensively, was originally written not to cause damage, although due to the bugs that were found in its code, it caused so much damage on the Internet that it was also referred to as the "Great Worm."

Answer: Yes

The Morris worm, written by Robert Tappan Morris Jr., was released on November 2, 1988. Its author originally didn't intend to write this worm to cause damage, although the opposite was the reality. Due to the bugs in the code, this worm caused great amounts of damage.

The way it was worked was that it exploited known vulnerabilities in Unix, fingerd, sendmail, rsh/rexec, as well as weak passwords. Luckily, it could only infect DEC VAX machines that were running BSD, and Sun systems.
10. Computer worms, viruses, as well as Trojans are generally grouped into one big group. What is this group called?

Answer: Malware

Since computer worms, computer viruses, and Trojans are all malicious software codes, it is safe to put them in one general category, which is called "Malware". As you may have guessed, mal means evil, while ware is short for software, so together, it's Malware, as in, evil software.
Source: Author Codelock

This quiz was reviewed by FunTrivia editor crisw before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
Most Recent Scores
Today : Guest 205: 7/10
Nov 30 2022 : Crzygl: 0/10
Nov 30 2022 : Guest 157: 0/10
Nov 30 2022 : Guest 2: 0/10
Nov 19 2022 : Guest 78: 5/10
Nov 18 2022 : Guest 96: 7/10
Nov 17 2022 : Guest 24: 0/10
Nov 17 2022 : ClarkyB: 10/10
Nov 17 2022 : Guest 84: 1/10

Score Distribution

quiz
12/3/2022, Copyright 2022 FunTrivia, Inc. - Report an Error / Contact Us