This is the second quiz about the security mechanisms & technologies subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: a: You will make your passwords more secure by regularly changing them
A common myth is that regularly changing passwords will make them more secure. The truth is that as long as your password is already strong, not compromised in a data breach, and has not been discovered by someone else, there is no need to regularly change it and it is unlikely that you will achieve anything from regularly changing it to another strong password.
Options, B, C, and D are all true statements about passwords.
Question 2
The correct answer is: c: Passwords
Usernames are often used in combination with passwords as a method of authentication. Unlike passwords, which should be kept secret, usernames are often publicly visible to others, so they don't need to be kept secret.
Question 3
The correct answer is: a: True
Passcodes are less secure than passwords or passphrases because they only contain numbers.
Question 4
The correct answer is: b: Access level
Users are assigned an access level that is related to their user profile login that defines what software, data, and services they can access. It can be known as the privileges a user account has. Access levels are related to file permission, but go beyond just files.
Question 5
The correct answer is: b: If the master password is lost, users could lose access to all their passwords with no way of recovering them.
If the master password is lost, users could lose access to all their passwords with no way of recovering them. This is because master passwords usually have no password reset mechanism.
Option A is incorrect as password managers usually use encryption to store passwords and require a master password to access the database with a low risk of data breach.
Option C is incorrect as password managers help people remember complex passwords for different electronic accounts since only one password needs to be remembered to gain access to the list of passwords. They are not limited to simple passwords.
Option D is incorrect as password managers are usually flexible. Most password managers allow usernames and passwords to be synchronised across multiple devices, including desktop computers and mobile devices.
Question 6
The correct answer is: d: It is faster than typing a password or PIN, saving time.
Biometric authentication is faster than typing a password or PIN. In most cases, users only need to put their finger on a device or look at a device to gain access.
Option A is incorrect as error rates are not usually very low. Errors can prevent the biometric system from recognising people. Sometimes, the error rates can be so high that it creates problems for the whole security system.
Option B is incorrect as biometric systems can be unusable by some people, such as people with disabilities.
Option C is incorrect as biometric systems are more expensive than traditional security systems due to the complex technology.
Question 7
The correct answer is: c: Encryption to secure files.
Antiviruses are designed to detect and remove computer viruses and other unwanted programs that harm a computer and do not usually provide encryption to secure files.
Options A, B, and D are all examples of antivirus features.
Question 8
The correct answer is: d: Blacklist
Question 9
The correct answer is: a: Signatures
Antiviruses detect viruses based on stored virus signatures. These are unique strings of data that are usual of known malware. These signatures are used by antivirus software to identify when it detects viruses that security experts have already identified.
Question 10
The correct answer is: d: It provides features to scan files for viruses and malware.
Options A, B, and C are all true statements about SSL.
Question 11
The correct answer is: c: Debit and credit card transactions
The SET protocol is a communications protocol used to secure electronic payments made using a debit or credit card.
Question 12
The correct answer is: a: True
Asymmetric encryption consists of two keys, called the public and private keys. The public key is available to anyone that wants to encrypt a message to a recipient. Data sent during transmission is usually encrypted using asymmetric encryption. This is because sharing the encryption key is a security risk as it could be intercepted during transmission and with one single key, the message could be decrypted by unauthorised users.
Question 13
The correct answer is: b: For discovering and reporting a security vulnerability, bug, or weakness.
A bug bounty is a reward offered by the owners of a system, computer program, or website, for discovering and reporting a security vulnerability, bug, or weakness. Bug bounties offer an incentive for users to identify security holes and vulnerabilities before they can be exploited by attackers, encouraging other users to help improve products.
Question 14
The correct answer is: c: As new technologies advance, new threats and vulnerabilities are being discovered.
As new technologies advance, new threats and vulnerabilities are being discovered. Keeping up with the latest changes, detecting zero-day vulnerabilities, and developing security mechanisms, technologies, and patches to protect against them before they can be exploited to launch cyberattacks by malicious users can be difficult.
Question 15
The correct answer is: b: False
Asymmetric encryption includes two keys, called the public and private keys. The private key is only available to the recipient and is used to decrypt the message. The decryption key is kept private, as suggested in the term 'private key'. This process usually takes place automatically and the recipient does not need to know the decryption key as the software stores it.
Your like or dislike has been added successfully. To see the changes, reload the page.