This is the first quiz about the security mechanisms & technologies subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: c: Encryption
Encryption is the use of complex algorithms to scramble sent information into random characters and symbols so that it cannot be read by any unauthorised users if intercepted.
Question 2
The correct answer is: a: To prove the identity of a website and start an encrypted session.
Options B, C, and D are incorrect as SSL certificates only mean the website uses an encrypted session to secure data and do not guarantee that a website uses two-factor authentication, is legitimate, or does not sell data.
Options A, C, and D are all true statements about spyware.
Question 3
The correct answer is: d: J4@v£h7m%
Since this password includes the most numbers, complex symbols, and letters, it is the strongest password.
Question 4
The correct answer is: b: CAPTCHA
A CAPTCHA is a security feature designed to prevent spam or abuse from automated bots by requiring that users take a simple test to verify that they are a human. It is most commonly used in web forms and contains tests that are impossible for most automated programs to recognise.
Question 5
The correct answer is: a: Using strong and complex passwords and using a password manager to remember them.
Question 6
The correct answer is: c: Because the latest versions of antiviruses contain the latest files that are required for detecting the newest viruses.
Antiviruses have to be regularly updated and maintained to ensure that the latest virus definitions are available and without updating, the antivirus would not be able to identify and block the latest threats.
Options A and B are incorrect as an antivirus offers no such guarantees.
Option D is incorrect as it is unlikely that an antivirus will stop working just because it isn't updated to the latest version. Users just won't be protected against the latest threats.
Question 7
The correct answer is: a: True
Because SSL and TLS are so closely related, it is common to refer to TLS as SSL/TLS.
Question 8
The correct answer is: d: It is a compulsory security feature on nearly all websites.
Two-factor authentication is usually an optional feature that you can enable if you want to add an extra layer of security to your account. However, some online services, particularly banking sites and online shopping sites, may require you to enable two-factor authentication to your account without giving you an option to disable it for your security.
Options A, B, and C are all true statements about two-factor authentication.
Question 9
The correct answer is: b: When encrypting stored data, like documents
Symmetric encryption is when a single key is used to encrypt and decrypt a message and all parties use the same key. Stored data, especially confidential documents, sometimes needs to be encrypted to prevent unauthorised access as if they gained access to a computer system, they would not be able to read any contents of the file. Stored data is usually encrypted using symmetric encryption.
Options A, C, and D are incorrect as they are most likely to use asymmetric encryption.
Question 10
The correct answer is: a: Attackers have been focusing on discovering TLS exploits that can be used to compromise data security and integrity.
Question 11
The correct answer is: d: All of the above
Options A, B, and C are all examples of ways to prevent online fraud.
Question 12
The correct answer is: b: When the recipient receives it.
For example, HTTPS, the secure version of the Hypertext Transfer Protocol used for communicating over the World Wide Web uses SSL/TLS to encrypt data, convert plaintext to ciphertext, and then decrypts the message when the recipient receives it.
Question 13
The correct answer is: a: 1
It is definitely possible to have more than one antivirus program installed. However, it is not recommended. Having more than one active antivirus program can result in conflicts between the two programs and additional use of resources, such as CPU and memory, causing a computer to become much slower. Installing more than one antivirus program will not provide any extra security for a computer. In fact, it might cause a computer to become unprotected due to the two conflicts between programs.
Question 14
The correct answer is: a: Encryption
Encryption prevents unauthorised users from reading data. It is not an authentication technique.
Options B, C, and D are examples of authentication techniques.
Question 15
The correct answer is: c: Ciphertext
Your like or dislike has been added successfully. To see the changes, reload the page.