Computer Security & Risks: Question Preview (ID: 9549)

Below is a preview of the questions contained within the game titled COMPUTER SECURITY & RISKS: Try These Questions .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]

Play games to reveal the correct answers. Click here to play a game and get the answers.

Which of the following passwords is most SECURE?
a) password b) CTOS c) Ib4ExaC d) 123456
Which of these words means Faking?
a) Bombing b) Hijacking c) Cracking d) Spoofing
Which of these is a piece of code that ATTACHES itself to an application program and secretly cause harm to a computer when you execute the program?
a) Virus b) Spybot c) Trojan d) Worm
What can a surge protector protect a system from?
a) Viruses b) All of the above c) Denial-of-services (DoS) attacks d) Power spikes
How does an antivirus software idenfity a malware?
a) Digital Signature b) Virus Signature c) Virus Certificate d) Digital Certificate
A computer which has been attacked and controlled remotely by an outsider is known as ___.
a) bot b) rootkit c) ghost d) zombie
A backup system used when there is power failure is ____
a) DoS b) RSS c) UPS d) Bot
Which of this is a Wireless Security Standard that secures your Wireless connections?
a) WPA2 b) RAID c) WIN d) WIFI
If I backup my entire harddisk, I am performing a ___ backup
a) restore b) 3 generation c) full d) incremental
Using physical locks, security cameras can prevent ___
a) software theft b) all of the above c) information theft d) hardware theft
Play Games with the Questions above at
To play games using the questions from the data set above, visit and enter game ID number: 9549 in the upper right hand corner at or simply click on the link above this text.

Log In
| Sign Up / Register