Quiz: Is your computer secure?

Estimated Completion Time
1 min
Quiz: Is your computer secure?
Image: Martin Poole/Stockbyte/Getty Images

About This Quiz

Yes, computers can make life easier, but they also can put your private information at risk. Find out how much you know -- or don't know -- about computer security by taking our quiz.
What is the process of encoding information in a way so that only someone with a key can decode it?
Compression
Systemic variation
Encryption
Correct Answer
Wrong Answer

Encryption refers to the practice of encoding data so that only someone with the right key can read it. Clever code breakers can sometimes crack encrypted messages, requiring security experts to devise more complex encryption algorithms.

Advertisement

In computer security terms, what is a hash?
A delicious way to cook potatoes
An encrypted value
A decryption key
Correct Answer
Wrong Answer

A hash or hash value is a string of characters that represent encrypted data. You create a hash value by running data through a hashing algorithm.

Advertisement

What does SSL stand for?
Secure Sockets Layer
Secret Service Logarithm
Systematic Security Level
Correct Answer
Wrong Answer

SSL stands for Secure Sockets Layer, a form of public key encryption.

Advertisement

What is a firewall?
Antivirus software
Software that logs Internet activity
A filter for an Internet connection
Correct Answer
Wrong Answer

A firewall acts as a filter for an Internet connection. It monitors incoming data and blocks certain data packets.

Advertisement

What is a proxy server?
A server that retrieves data from host servers before sending it to a computer
A virtual server that can behave like a mail server, Web server or FTP server
A waiter who never seems to be in the restaurant when your water glass is empty
Correct Answer
Wrong Answer

Proxy servers act as middlemen for the Internet. They retrieve Web pages and send them to computers, which means the computer in question never has to deal with the server hosting the Web page directly.

Advertisement

What is another term for a zombie computer army?
Phishing pharm
Botnet
Romero's Revenge
Correct Answer
Wrong Answer

A botnet is a network of computers that have transformed into bots -- devices under the control of a third party.

Advertisement

What does DDoS stand for?
Dangerous DOS open Security
Digital Default of Servers
Distributed Denial of Service
Correct Answer
Wrong Answer

A Distributed Denial of Service attack uses computers to send millions of message requests to a server with the goal of overwhelming and crashing the server. A large DDoS attack can affect global Internet traffic.

Advertisement

Which kind of malware typically resides in a larger, innocent computer program?
Worm
Trojan horse
Computer virus
Correct Answer
Wrong Answer

Traditionally, a computer virus is a line of code or a function within a larger computer program. While not all computer viruses are harmful, the most famous ones can cause a lot of damage.

Advertisement

What is phishing?
A decryption method that uses complex algorithms
A method of online identity theft
A way to send spam mail to millions of people at once
Correct Answer
Wrong Answer

Phishing refers to a technique designed to fool innocent people into sharing private information like bank account numbers and credit card information.

Advertisement

What's another name for crackers -- malicious hackers who infiltrate secure systems in order to steal information or cause damage?
Black hats
Pirates
Digital rogues
Correct Answer
Wrong Answer

A black hat hacker is someone who actively attempts to infiltrate secure systems or build computer viruses with the intent to cause mischief or steal information.

Advertisement

You Got:
/10
Martin Poole/Stockbyte/Getty Images