This test contains 25 questions. The questions are multiple choice, true/false, and fill-in-the-blank. You may not skip any of the questions. There is no time limit on the test.
You must score 70 or higher to receive the certificate of completion. You may retake the test as many times as you’d like. At the end of the test you’ll be shown the correct answer for each question so you can determine which questions stumped you.
Once you pass the test, you’ll immediately be able to print the certificate of completion.
Good luck!
Computer Security and Privacy Test
Quiz Summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
CorrectIncorrect -
Question 2 of 25
2. Question
Unsolicited, bulk e-mail sent over the Internet is called _______.
CorrectIncorrect -
Question 3 of 25
3. Question
A device that protects a computer system from damage due to electrical fluctuations is called a(n) _______.
CorrectIncorrect -
Question 4 of 25
4. Question
Encryption can be used for privacy purposes, in addition to security purposes.
CorrectIncorrect -
Question 5 of 25
5. Question
Color copying money is an example of _______.
CorrectIncorrect -
Question 6 of 25
6. Question
Very few major U.S. companies monitor the online activities of their employees.
CorrectIncorrect -
Question 7 of 25
7. Question
The rights of individuals and companies to control how information about them is collected and used is called __________.
CorrectIncorrect -
Question 8 of 25
8. Question
Which is an example of something used to gain access to a possessed object access system?
CorrectIncorrect -
Question 9 of 25
9. Question
The most common type of possessed knowledge, comprising secret words or character combinations associated with an individual, are _______.
CorrectIncorrect -
Question 10 of 25
10. Question
Driving around looking for a Wi-Fi network to access is referred to as ________.
CorrectIncorrect -
Question 11 of 25
11. Question
_______ access control systems use some type of unique physical characteristic of a person to authenticate that individual.
CorrectIncorrect -
Question 12 of 25
12. Question
A(n) ____________ can be used at a Wi-Fi hotspot to create a secure path over the Internet.
CorrectIncorrect -
Question 13 of 25
13. Question
A(n)____________ can be added to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed.
CorrectIncorrect -
Question 14 of 25
14. Question
A computer virus can only be transferred to another computer via a storage medium.
CorrectIncorrect -
Question 15 of 25
15. Question
An access control system that uses passwords is a possessed knowledge access system.
CorrectIncorrect -
Question 16 of 25
16. Question
Using a password that is two characters long is an example of two-factor authentication.
CorrectIncorrect -
Question 17 of 25
17. Question
Secure Web pages use encryption to securely transfer data sent via those pages.
CorrectIncorrect -
Question 18 of 25
18. Question
Using a computer resource for unapproved activities is called __________.
CorrectIncorrect -
Question 19 of 25
19. Question
A secret combination of characters used to gain access to a computer, computer network, or other resource is called a(n) _______.
CorrectIncorrect -
Question 20 of 25
20. Question
A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system is called a computer _______.
CorrectIncorrect -
Question 21 of 25
21. Question
A computer that is controlled by a hacker or other computer criminal is called a(n) _______.
CorrectIncorrect -
Question 22 of 25
22. Question
Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method is called cyber_______.
CorrectIncorrect -
Question 23 of 25
23. Question
Using a computer to break into another computer system is called _______.
CorrectIncorrect -
Question 24 of 25
24. Question
Software, typically a suite of programs, used to protect your computer against a variety of threats is called __________.
CorrectIncorrect -
Question 25 of 25
25. Question
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures is called a(n) __________.
CorrectIncorrect