Computer Security – Overview, Different Cyber Attacks, Virus, Malware, Phishing, and Ransomware

1. What is the most prevalent source of viruses that can infect your computer’s hard drive?

  1. Using antivirus software
  2. Regular system updates
  3. Accessing secure websites
  4. Downloading software from untrusted sources
Show Answer

Answer: Option D. Downloading software from untrusted sources

2. Which of the following does not pose a security or privacy threat?

  1. Trojan horse
  2. Spam
  3. Phishing emails
  4. Malware downloads
Show Answer

Answer: Option B. Spam

3. What features do most online banking platforms offer to mitigate the risk of keystroke logging during password entry?

  1. Virtual Keyboard
  2. Standard text entry fields
  3. Unencrypted password storage
  4. Automatic password saving in browsers
Show Answer

Answer: Option A. Virtual Keyboard

4. Which statements regarding ‘Net Metering’ are accurate?

  1. It serves as a billing system for solar energy consumers.
  2. It is mainly utilized to track water consumption in urban residences.
  3. It enables consumers to earn credits for the electricity they contribute to the grid.

Please select the correct option from the options provided below:

  1. Only 1 & 2
  2. Only 1 & 3
  3. Only 2 & 3
  4. Only 1
Show Answer

Answer: Option B. Only 1 & 3

5. Vishing has emerged as a criminal tactic that employs social engineering through which of the following mediums?

  1. Phone calls or voice messages
  2. Text messages
  3. Email communications
  4. Social media posts
Show Answer

Answer: Option A. Phone calls or voice messages