This chapter discusses essential security aspects in computer science, focusing on malware, threats, and preventive measures. Understanding these concepts is crucial for protecting devices and data in a connected world.
Which of the following is a characteristic of a worm?
What does phishing typically use to deliver malware?
What is the primary purpose of anti-malware software?
Eavesdropping on a network is best described as what?
What is the main difference between a virus and a worm?
What is it called when a user marks an email as spam?
What does the term 'phishing' in spam contexts refer to?
Why is it important to verify links in suspicious emails?
What could be a red flag indicating an email is spam?
In the context of spam, what does 'opt-out' refer to?
Why should sensitive information never be sent over HTTP?
Which of the following is NOT a benefit of using HTTPS?
Which protocol is more suitable for e-commerce websites?
Which filtering technique does a stateful firewall use?
Which of the following is NOT a feature of a firewall?
What is the primary purpose of cookies in web browsing?
What kind of information can cookies store about a user?
Why is it important to manage cookies in a web browser?
What is a major risk associated with the use of cookies?
Which of the following is NOT a function of cookies?
Which security measure could help reduce cookie misuse?
How does the SameSite attribute enhance cookie security?
Which of the following is true regarding secure cookies?
Which of the following best describes Black Hat hackers?