Quiz: Is your computer secure?

Quiz: Is your computer secure?
Image: Martin Poole/Stockbyte/Getty Images

About This Quiz

Yes, computers can make life easier, but they also can put your private information at risk. Find out how much you know -- or don't know -- about computer security by taking our quiz.
What is the process of encoding information in a way so that only someone with a key can decode it?
Compression
Systemic variation
Encryption
Encryption refers to the practice of encoding data so that only someone with the right key can read it. Clever code breakers can sometimes crack encrypted messages, requiring security experts to devise more complex encryption algorithms.

Advertisement

In computer security terms, what is a hash?
A delicious way to cook potatoes
An encrypted value
A hash or hash value is a string of characters that represent encrypted data. You create a hash value by running data through a hashing algorithm.
A decryption key

Advertisement

What does SSL stand for?
Secure Sockets Layer
SSL stands for Secure Sockets Layer, a form of public key encryption.
Secret Service Logarithm
Systematic Security Level

Advertisement

What is a firewall?
Antivirus software
Software that logs Internet activity
A filter for an Internet connection
A firewall acts as a filter for an Internet connection. It monitors incoming data and blocks certain data packets.

Advertisement

What is a proxy server?
A server that retrieves data from host servers before sending it to a computer
Proxy servers act as middlemen for the Internet. They retrieve Web pages and send them to computers, which means the computer in question never has to deal with the server hosting the Web page directly.
A virtual server that can behave like a mail server, Web server or FTP server
A waiter who never seems to be in the restaurant when your water glass is empty

Advertisement

What is another term for a zombie computer army?
Phishing pharm
Botnet
A botnet is a network of computers that have transformed into bots -- devices under the control of a third party.
Romero's Revenge

Advertisement

What does DDoS stand for?
Dangerous DOS open Security
Digital Default of Servers
Distributed Denial of Service
A Distributed Denial of Service attack uses computers to send millions of message requests to a server with the goal of overwhelming and crashing the server. A large DDoS attack can affect global Internet traffic.

Advertisement

Which kind of malware typically resides in a larger, innocent computer program?
Worm
Trojan horse
Computer virus
Traditionally, a computer virus is a line of code or a function within a larger computer program. While not all computer viruses are harmful, the most famous ones can cause a lot of damage.

Advertisement

What is phishing?
A decryption method that uses complex algorithms
A method of online identity theft
Phishing refers to a technique designed to fool innocent people into sharing private information like bank account numbers and credit card information.
A way to send spam mail to millions of people at once

Advertisement

What's another name for crackers -- malicious hackers who infiltrate secure systems in order to steal information or cause damage?
Black hats
A black hat hacker is someone who actively attempts to infiltrate secure systems or build computer viruses with the intent to cause mischief or steal information.
Pirates
Digital rogues

Advertisement

You Got:
/10
Martin Poole/Stockbyte/Getty Images

Featured