You are on page 1of 2

How can we not be prey to various threats on the internet ?

1. Who is interested in ensuring online security?


• Computer network administrators and service users
• Only computer network administrators
• Service users only

2. What are the ways in which a computer connected to the Internet can be compromised in
terms of security?
 Viruses, computer worms
 Only through viruses that can be harmless
 Only through computer worms

3. What is a computer worm?


 A special program from viruses
 A virus-like program that 'travels' on the network via e-mail
 No correct answer

4. What security mechanisms do you know?


 Only the data encryption (encryption) mechanism aims to bring the data in an
unintelligible form for unauthorized persons.
 The mechanism for encrypting (encoding) the data during the transmission in the network
or in case of storing the information on a support that can be accessed by unauthorized
persons and the digital signature
 Digital signature only
 No answer is correct

5. How do I choose a password correctly?


A password can be considered "good" if:
 it consists of at least 6 characters; it contains a random combination of small, large
characters, numbers and other graphic signs;
 A correct password is a dictionary word;
 A correct password represents personal data that can be easily deduced;
 It consists of at least 6 neighboring characters on the keyboard.

6. What are the sites with inappropriate content?


 Only those with pornographic or violent content
 Only those with content that promotes drug use
 Only those in which there are references to suicide
 Those with pornographic, violent content, drug content, online payments and references
to suicide

7. What risks can arise in the case of scams such as ‘See who saw your profile!
 Behind these seemingly harmless applications can hide dangerous browser extensions,
fake antivirus that are automatically downloaded to your computer.
 none

8. What effect can net addiction have?


 decrease in school performance,
 problems of social integration
 disorders of the nervous system
 Decreased school performance, nervous disorders, problems in social integration

8. What are the illegal actions that a child can perform on the net?
 downloading files protected by law
 downloading movies / images protected by law
 using the account of another person for various purposes
 All answers are correct

9. What does online harassment entail?


 Using information technology e-mail, websites, blogs, mobile phones to permanently
hostile attack a child
 Using Bitdefender Parental Control Modules
 the use of services that permanently monitor the children's activity
 All answers are correct

10. What danger occurs in the case of disclosure of personal data


 They can be easily found and fall prey to physical attacks
 Their data may be used by other people for purposes that would not be desirable
 Negative messages about them can be attached
 All the answers are correct

You might also like