Computer Concepts
Learn Computer Concepts in FREE step-by-step lessons.
Quiz on Data Security
After doing all parts of the lesson you should be able to answer these questions.
Write down the answers first. Click the to check your answer.
_____ is a security process in which the identity of a person is verified
Authentication
The science of measuring a person’s unique physical features is called ____
biometrics
What is Botnet?
a collection of computers autonomously or automatically working together
___ filters out packets that are potentially dangerous
firewall
An individual who subverts computer security without authorization is called a ____
hacker
What are two things to look for on a website before giving sensitive information?
HTTPS instead of just HTTP and a lock icon
Viruses, worms, and spyware are called ____
malware
Using fraudulent email and fake websites that try to trick a person into providing private information is called ____
phishing
A program that attaches itself to a file and delivers a destructive payload is a ____
virus
A ____ replicates itself numerous times and spreads to other computers or overwhelm systems
worm
A computer under the remote control of a hacker is called a ____
zombie
Please review the material for any questions you miss.