Zebra0.com

computer-concepts securityComputer Concepts

Computer Concepts

Learn Computer Concepts in FREE step-by-step lessons.

Quiz on Data Security

After doing all parts of the lesson you should be able to answer these questions.

Write down the answers first. Click the check to check your answer.

_____ is a security process in which the identity of a person is verified answer

   Authentication

The science of measuring a person’s unique physical features is called ____ answer

   biometrics

What is Botnet? answer

   a collection of computers autonomously or automatically working together

___ filters out packets that are potentially dangerous answer

   firewall

An individual who subverts computer security without authorization is called a ____ answer

   hacker

What are two things to look for on a website before giving sensitive information? answer

   HTTPS instead of just HTTP and a lock icon

Viruses, worms, and spyware are called ____ answer

   malware

Using fraudulent email and fake websites that try to trick a person into providing private information is called ____ answer

   phishing

A program that attaches itself to a file and delivers a destructive payload is a ____ answer

   virus

A ____ replicates itself numerous times and spreads to other computers or overwhelm systems answer

   worm

A computer under the remote control of a hacker is called a ____ answer

   zombie

Please review the material for any questions you miss.