Computer Concepts
Learn Computer Concepts in FREE step-by-step lessons.
Quiz on Data Security
After doing all parts of the lesson you should be able to answer these questions.
Write down the answers first. Click the
to check your answer.
_____ is a security process in which the identity of a person is verified 
Authentication
The science of measuring a person’s unique physical features is called ____ 
biometrics
What is Botnet? 
a collection of computers autonomously or automatically working together
___ filters out packets that are potentially dangerous 
firewall
An individual who subverts computer security without authorization is called a ____ 
hacker
What are two things to look for on a website before giving sensitive information? 
HTTPS instead of just HTTP and a lock icon
Viruses, worms, and spyware are called ____ 
malware
Using fraudulent email and fake websites that try to trick a person into providing private information is called ____ 
phishing
A program that attaches itself to a file and delivers a destructive payload is a ____ 
virus
A ____ replicates itself numerous times and spreads to other computers or overwhelm systems 
worm
A computer under the remote control of a hacker is called a ____ 
zombie
Please review the material for any questions you miss.
That's all! Congratulations on completing all of the lessons in computer-concepts!