Computer Security & Risks: Question Preview (ID: 9549)

Below is a preview of the questions contained within the game titled COMPUTER SECURITY & RISKS: Try These Questions .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]

Play games to reveal the correct answers. Click here to play a game and get the answers.

Which of the following passwords is most SECURE?
a) password
c) Ib4ExaC
d) 123456

Which of these words means Faking?
a) Bombing
b) Hijacking
c) Cracking
d) Spoofing

Which of these is a piece of code that ATTACHES itself to an application program and secretly cause harm to a computer when you execute the program?
a) Virus
b) Spybot
c) Trojan
d) Worm

What can a surge protector protect a system from?
a) Viruses
b) All of the above
c) Denial-of-services (DoS) attacks
d) Power spikes

How does an antivirus software idenfity a malware?
a) Digital Signature
b) Virus Signature
c) Virus Certificate
d) Digital Certificate

A computer which has been attacked and controlled remotely by an outsider is known as ___.
a) bot
b) rootkit
c) ghost
d) zombie

A backup system used when there is power failure is ____
a) DoS
b) RSS
c) UPS
d) Bot

Which of this is a Wireless Security Standard that secures your Wireless connections?
a) WPA2
c) WIN

If I backup my entire harddisk, I am performing a ___ backup
a) restore
b) 3 generation
c) full
d) incremental

Using physical locks, security cameras can prevent ___
a) software theft
b) all of the above
c) information theft
d) hardware theft

Play Games with the Questions above at
To play games using the questions from the data set above, visit and enter game ID number: 9549 in the upper right hand corner at or simply click on the link above this text.

Log In
| Sign Up / Register