1) The installation of an antivirus refers to which step of the security
implementation a) Reaction b) Precaution c) Maintenance Answers B 2) What is a zombie machine? a) a machine that executes the instructions of another machine b) a machine that has the symptoms of malware infection. c) a machine on which a zombie game is played Answers A 3) The process that accurately ensures that the sender of a message is who he claims to be is called: a) Non-repudiation b) Confidentiality c) Authenticity Answers A
4) The system flaws that could not be fixed are:
a) vulnerabilities b) threats c) zero days Answers C
5) A malicious program that allows you to open a port on a machine is
called: a) a worm b) a rootkit c) a backdoor Answers C 6) A program that looks good but hides a lot of malware in it is: a) virus b) trojan c) spyware Answers B
7) What are the threats related to phones?
a) bluesnarfing b) phishing c) Grooming d) Eavesdropping Answers A D 8) Total virus is a tool for analysis: a) systems b) links c) attachments Answers B 9) The technique of modifying the source code of a site before putting it back on the Internet is called: a) Reverse engineering b) Phishing c) Spoofing Answers B 10) To secure an operating system, it is recommended to: a) Disable the guest account b) Use a standard account c) Privilege escalation Answers B 11) A secure site can be recognized from: a) padlock, green bar and Https b) Https Everywhere c) Malwarebytes Answers A 12) Associate each protocol with its port a) SMTP b) 80 c) 25 d) HTTPS e) 23 f) 443 g) Telnet h) http Answers A->C ; B->H ; D->F ; E->G 13) Sending unwanted messages is called a) spamming b) e-mail c) cookies Answers A 14) What is the certificate that HTTPS sites use a) SSL b) SMTP c) SQL Answers A 15) What is a cookie? a) it is spyware b) it is a small cake c) it is a program that records the user's preferences Answers C 16) The art of convincing a person to obtain their personal information is: a) Keylogger b) Social engineering c) Ransomware Answers B 17) The attack which consists in intercepting, stealing and modifying the information of a mobile communication is called : a) Bluesnarfing b) Man In The Middle c) Eavesdropping Answers B 18) To encrypt her keyboard entries, Maria must install: a) Keyscramble b) Keylogger c) Keystroke Answers A 19) an information is: a) a data b) a publication c) data that has meaning Answers C 20) The part of the email that contains the source address, destination address, subject, location, time, ip address is called: a) Header b) Body c) Signature Answers A 21) The tool that allows you to block spam is: a) Spamfighter b) Lockbin c) Tor Answers A 22) The type of encryption that allows you to use a public key and a private key is: a) Symmetric encryption b) Robust encryption c) Asymmetric encryption Answers C 23) To secure your email account, it is recommended to configure: a) double authentication b) antivirus software c) metadata Answers A 24) To keep children safe on the Internet, we must: a) configure the parental control b) prohibit a child from using the Internet c) install a child navigator Answers C 25) The command that allows to see the open ports is: a) Ping b) Ipconfig c) Netstat Answers C