Resources Lessons Quizzes Assignments Discussion Completion Introduction to PC Security quizzes: lesson 1 quiz results Lesson 1 Quiz Results Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again. Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good. I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy. Thank you, -Your Instructor Evaluation of your answers: 1. What is a myth? You chose: An untrue statement presented as fact or truth about a subject. Correct! Yes, a myth is an untrue statement presented as fact or truth about a subject. 2. In computer related terms, what is a cookie?
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What is a myth?
You chose: An untrue statement presented as fact or truth about a subject.
Correct! Yes, a myth is an untrue statement presented as fact or truth about a subject.
2. In computer related terms, what is a cookie?
You chose: An ASCII text or a text file written in code.
Correct! While the first cookies were ASCII text only, many new cookies
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What is the standard protocol of the Internet?
You chose: TCP/IP or IP.
Correct! TCP/IP is the accepted standard of the Internet community.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. Why is the OSI model important to networks?
You chose: Because it guarantees communication.
Correct! Regardless of the operating system, PC manufacturer or software you use, the OSI model guarantees you will always be able to communicate across a network.
Correct! Based on the UNIX operating system for Internet connectivity, a socket is a protocol for the TCP/IP stack.
3. What is open source?
You chose: Source code that is openly available and freely distributed to everyone without charge.
Correct! This code is also distributed under the GNU General Public License.
4. When is a raw socket dangerous in an operating system?
You chose: When it allows unsecured access to the root or core of the network.
Correct! Under normal circumstances, the raw socket is protected to allow only administrators who have root privileges. An operating system that grants unrestricted access to this core is dangerous.
5. Excluding the OSI model, hardware, and programming code, what is the weakest link in software?
You chose: The responsible party for keeping software updated.
Correct! Aside from the vulnerabilities in programming code for software and its interaction with the Application Layer of the OSI model, the responsible party for keeping software updated is the weakest link in software applications.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What is the definition of a virus?
You chose: A parasitic program or code written (usually intentionally but sometimes accidentally) to enter a computer without the user's permission or knowledge.
Correct! This is the technical definition of a virus.
2. What are the types of viruses?
You chose: File infection, boot sector, master boot record, multi-partite, and macro.
Correct! File infection affects program files, boot sector and master boot record affects your computers boot files and system area files, multi-partite affects both boot records and program files, and macro viruses affect data files. These are the five types of viruses.
3. What is the unique difference between a Trojan Horse and other viruses and worms?
You chose: It does not replicate and must be invited into the computer.
Correct! Unlike viruses and worms that can self replicate, Trojans do not and must be invited into the computer through a program or file.
4. Which one of the following is used to measure how quickly a threat can spread?
You chose: Distribution.
Correct! Distribution measures how quickly the threat can spread.
5. In a category 5 threat, what must be present?
You chose: All three measurements (Wild, Distribution, and Damage) must be high.
Correct! A category 5 threat is the most severe and therefore all three measurements must be
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What port does the Universal Plug and Play vulnerability open to the Internet?
You chose: Port 1900.
Correct! The Universal Plug and Play vulnerability opens Port 1900 and announces to any computer listening that your PC is an Internet server.
2. What causes an exploit?
You chose: A person or program takes advantage of a known vulnerability.
Correct! An exploit is a program or technique that takes advantage of a vulnerability.
3. What is the best method for protecting the perimeter?
You chose: Use a software or hardware firewall.
Correct! The best defense is using a software or hardware firewall to stop activity at the point of contact to untrusted services.
4. What is the difference between a vulnerability and exposure?
You chose: In exposure, the possibility for a vulnerability exists but it does not have a universal vulnerability present.
Correct! Exposure is a state where a computer system or network does not have a known universal vulnerability but still has the potential to comprise security.
5. What files on a computer are used as translators for hardware to speak to software?
You chose: Drivers.
Correct! Driver files are the translators used by the computer to interpret commands from programming code.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What is bandwidth?
You chose: The amount of data flowing through a network connection.
Correct! Bandwidth is the amount of data flowing through a network connection.
2. What type of attack sends synchronized packets through Internet servers and routers?
You chose: A Distributed Denial of Service (DDoS) or Distributed Reflected Denial of Service (DRDoS).
Correct! DDoS and DRDoS attacks send synchronized packets through Internet servers and routers using spoofed addresses.
3. What are the terms used for a modem losing a connection?
You chose: Burp or hiccup.
Correct! In technical circles, a modem burp or hiccup explains a modem losing connection to its router in cyberspace.
4. Why does a flood of User Datagram Protocol (UDP) packets create a flood of Internet Control Message Protocol (ICMP) packets?
You chose: Because the flooded computer tries to compensate by redirecting traffic elsewhere.
Correct! When flooded with excess data like UDP packets, a computer will try to redirect traffic by trying to send ICMP packets back to the sending computer.
5. What does it mean to re-cycle a modem?
You chose: You power down the PCs, router, and modem and wait 20 seconds before turning it on because it lost connection.
Correct! To re-cycle a modem after loss of connection, you power down the PCs, router (if applicable), and the modem. Wait 20 seconds before turning on the modem, router, and PCs.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. Where is the best place to stop an unwanted connection?
You chose: At the packet.
Correct! If you stop the packet there is not communication and therefore no connection is established.
2. What is a breach?
You chose: A state when something has entered a network or network device without the necessary permission to do so.
Correct! Also called a compromise, this is the condition where your security and safety are questionable causing a breach.
3. For a router with a built-in firewall, where do you find the setting to block ping requests?
You chose: The Tools or Filtering tab.
Correct! Depending on the manufacturer, you will find ping blocking in the Tools or Filtering tab.
4. Which protocol enables an ISP to assign a dynamic IP address?
You chose: DHCP.
Correct! Dynamic Host Configuration Protocol or DHCP enables ISPs to dynamically change an IP address when it needs to.
5. What is a wild card?
You chose: The asterisk or star (*).
Correct! The asterisk or star (*) is a wild card meaning – any and all.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What is enterprise edition software?
You chose: A software bundle with one installation CD, multiple licenses, and network capabilities.
Correct! Enterprise editions are software bundles that include one installation CD designed for business networks and licenses for five or more users.
2. Why should you share your security settings with your firewall software manufacturer?
You chose: Because it helps them discover new threats, worms, and vulnerabilities.
Correct! By sharing your settings and alert logs with the software manufacturer, it helps them discover new threats, worms, and vulnerabilities.
3. What does it mean to start the service when configuring a software firewall?
You chose: A technical way of saying you want to run the program so it will protect your PC and start automatically when you turn on your computer.
Correct! Starting the service is a technical way of saying you want to run the program so it will protect your PC. Failure to do so will stop the program from running automatically when you turn on your computer.
4. What can you do if you make a mistake in configuring and can't access the Internet or network?
You chose: Disable the firewall completely or shut it down.
Correct! By clicking over the icon, you can instantly disable the firewall allowing Internet and network access. You can also shut it down according to the software methods for turning off the service.
5. What settings in firewall software allows you to add IP addresses, e-mail addresses, and other personal information you want to keep secure?
You chose: The privacy controls or ID lock settings.
Correct! In Zone Alarm software, it's the ID lock, and in other software, it's the privacy controls that allow you to customize information you wish to keep secure.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
1. If your laptop does not have Ethernet capabilities on the motherboard, what additional device would you need?
You chose: A Type II PCMCIA card.
Correct! A Type II PCMCIA card has modem, fax, and Ethernet capabilities.
2. What is the wireless band frequency?
You chose: 2.4 GHz to 5 GHz.
Correct! The 802.11 wireless networks work on a frequency between 2.4 and 5 GHz.
3. What is the Wi-Fi Alliance?
You chose: An association formed to certify interoperability of wireless Local Area Network products based on the IEEE 802.11 specification.
Correct! The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specifications.
4. What is asymmetric encryption?
You chose: A two-key encryption system.
Correct! Also called public-key encryption, asymmetric encryption requires two keys.
One key encrypts data, while the other is used to decrypt the data.
5. What is the best password option to use on a laptop?
You chose: A BIOS supervisor password.
Correct! A BIOS supervisor password prevents anyone from getting into the setup and changing the user login password.
Important: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What makes a VPN different from a conventional network?
You chose: The conventional network is always visible where the VPN only becomes real when it's connected to.
Correct! You do not share VPN connections openly as you do conventional network connections. A VPN only becomes a reality when a connection is made.
<hr size=2 width="100%" align=center>
2. What is virtual memory?
You chose: A creation of the computer.
Correct! Virtual memory is the creation of the computer. For instance, like a Window's swap file where memory is set aside to manage tasks. The memory disappears when the computer is shut down.
<hr size=2 width="100%" align=center>
3. What are the three types of VPNs?
You chose: Remote access, intranet-based, and extranet-based.
Correct! Remote access is a user-to-LAN VPN connection, intranet-based is VPN used to connect remote users to a private network, and extranet-based is a LAN-to-LAN connection.
<hr size=2 width="100%" align=center>
4. How are VPNs created?
You chose: A process called tunneling.
Correct! VPNs are created through the process of tunneling which wraps data into a packet and send the wrapped packet through another packet across a network.
5. Which is considered the most secure protocol available today?
You chose: IPSec.
Correct! IPSec, the protocol used for encapsulating VPN data is considered the most secure protocol today.
question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.
Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.
I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.
Thank you,
-Your Instructor
Evaluation of your answers:
1. What are the three categories that information is divided into?
You chose: Individual, small-to-midsized business (SMB), and enterprise.
Correct! Figuring out which category you fit into will help you decide on the kind of security information you'll need to keep updated on.
<hr size=2 width="100%" align=center>
2. If you have five people working for you in a home-based business, what category of information might you find specifically for your needs?
You chose: SOHO
Correct! Small Office Home Office (SOHO) information is designed for individuals who run a home based business with less than 10 employees.
<hr size=2 width="100%" align=center>
3. What is a webcast?
You chose: An online presentation that is broadcast over the Internet or Web.
Correct! A webcast is an online presentation that is broadcast over the Internet or Web. You could also call it an online seminar.
<hr size=2 width="100%" align=center>
4. What is the command to check for programs running when the computer starts?
You chose: msconfig.
Correct! This is the command you use to check for programs running in the statup menu or in the background of a Windows OS PC.
<hr size=2 width="100%" align=center>
5. What is a key chain token?
You chose: A gadget that digitally displays new passwords every three-to-five seconds.
Correct! A key chain token is a little gadget that digitally generates and displays new passwords every three-to-five seconds. The token is connected to a key chain, and hence, the name, key chain token.