0 of 6 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 6 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?CorrectIncorrect
Which of the following is an example of a “phishing” attack?CorrectIncorrect
Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?CorrectIncorrect
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …CorrectIncorrect
“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?CorrectIncorrect
Which of the following four passwords is the most secure?CorrectIncorrect