Cyber Security Quiz By: Alex Alberg. Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Computer Viruses.
The Internet = A World of Opportunities
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Information Technology Resource Use Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
1 Computer Security: Protect your PC and Protect Yourself.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
Managing Windows Security
Lesson 3 Safe Computing.
Homeland Security: Computer Protection
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Risk of the Internet At Home
Online Grant Application
Lab 7 – Defeating MALWARE
Faculty of Science IT Department By Raz Dara MA.
Cybersecurity By Sri Kankanahalli.
How to Stay Safe Online Rollie Edwards.
What devices use the internet?
Privacy, Security, and Ethics
Presentation transcript:

Cyber Security Quiz By: Alex Alberg

Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters D. All on the above

Q. A firewall: A. Is harmful to you computer B. Is default set ON C. Blocks harmful data from entering your computer D. Is worthless and should be ignored

Q. True or false: Virus protection software never needs to be updated. A. True B. False

Q. Spam: A. Is harmless and does not need to be deleted B. Should not be replied to and deleted immediately C. Is genuine and should be trusted D. Should be stored for reference

Q. A.exe postfix stands for: A. Executable B. Excel file C. Extension D. Extra

Q. Hackers are: A. A joke made to scare people B. A growing and genuine threat C. Real, but harmless D. Hopelessly incompetent

Q. A virus can be attached to the following: A. B..exe C. Website D. All of the above

Q. Malware is: A. Designed to help defend your computer against viruses B. Software designed to extract information from your computer C. Harmless D. Undetectable

Q. True or False: A worm will help located and destroy viruses. A. True B. False

Q. Trojans: A. Are attached to useful tools B. Can act like worms or viruses C. Are often installed without the users knowledge D. All of the above

Congratulations!!!

Correct! Click the button in the bottom right hand corner of the question slide to continue.

Try Again!