Quiz Summary
0 of 6 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 6 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 6
1. Question
What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?
CorrectIncorrect - Question 2 of 6
2. Question
Which of the following is an example of a “phishing” attack?
CorrectIncorrect - Question 3 of 6
3. Question
Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?
CorrectIncorrect - Question 4 of 6
4. Question
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
CorrectIncorrect - Question 5 of 6
5. Question
“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
CorrectIncorrect - Question 6 of 6
6. Question
Which of the following four passwords is the most secure?
CorrectIncorrect