SlideShare a Scribd company logo
1 of 4
 Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityresources: pre-test results Pre-TestEvaluation of your answers:Which method of Internet connection is the most secure?You chose: DSL.Correct! DSL is the most secure type of connection but it still has vulnerabilities.What do the terms 802.3 and 802.11 refer to?You chose: Hardwire and wireless network connection standards.Correct! 802.3 is the hardwired Ethernet connection and 802.11 is a wireless connection standard. How many layers are there in the OSI model?You chose: 7.Correct! There are seven layers to the OSI model.What is the difference between a virus and a worm?You chose: A virus requires human intervention to acquire where a worm can travel on its own and does not require a host file.Correct! Viruses do require human intervention to acquire while worms can move on their own and do not require a host file. Which scumware, malware, adware, or spyware lies to the computer that what it's seeing doesn't really exist?You chose: A rootkit program.Correct! A rootkit program hides from the computer by lying to it and telling the PC that the program it sees doesn't really exist. What is a universal vulnerability?You chose: A vulnerability that creates a known flaw in the security of a PC system or network.Correct! A vulnerability is universal when an operating system, software application, or some other programming code creates a known flaw in the security of a PC system or network.What is a SYN Flood attack?You chose: A method of flooding a computer with packets containing the address, port and information for communications.Correct! A SYN flood attack sends a flood of synchronized (SYN) packets containing the address, port, and other information necessary to communicate with the computer. What is the best protection for network security?You chose: A router with a built-in firewall and a software firewall.Correct! A router with built-in firewall can stop the packets from entering the network completely, while a software firewall will provide additional protection to individual PCs from spoofed packets slipping past the routers built-in firewall.In business, why do you need to worry about providing effective security for your network?You chose: Because of new laws governing the safe storage of personally identifying information.Correct! New legislation is appearing all the time that governs the safe storage of credit card information and personally identifying information. Failure to do so, could result in a business being liable for the financial loss to the customer.What do you call the new technology used in laptop engineering and design?You chose: Mobile.Correct! Mobile technology is the term used for the concept of designing lighter weight laptops with extended life batteries and wireless access. In computing terms, what does the term 'virtual' mean?You chose: Being in essence or effect, but not in fact.Correct! The term 'virtual' in computing has taken on the meaning from Webster's dictionary, which means being in essence or effect, but not fact. Why should you verify that antivirus software definitions have been updated when you do a security check?You chose: It verifies that nothing has interrupted the proper operation of the software.Correct! If the virus definitions are outdated and the auto-update is still enabled, it may indicate a virus is blocking the normal function of the software. Your score: 100% (out of 100%). Excellent job!Pre-TestDate submitted: 10/23/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion  Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
Pre Test Results Introduction To Pc Security
Pre Test Results Introduction To Pc Security
Pre Test Results Introduction To Pc Security

More Related Content

More from Walmart Super Center

Resume of ken smith black data procsssing associates 8 9 2015
Resume of ken smith black data procsssing associates  8 9 2015Resume of ken smith black data procsssing associates  8 9 2015
Resume of ken smith black data procsssing associates 8 9 2015Walmart Super Center
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Walmart Super Center
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Walmart Super Center
 
Paycation travel cover kenneth smith
Paycation travel cover kenneth smithPaycation travel cover kenneth smith
Paycation travel cover kenneth smithWalmart Super Center
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Walmart Super Center
 
Cover letter kenneth smith black data processing associates
Cover letter kenneth smith black data processing associatesCover letter kenneth smith black data processing associates
Cover letter kenneth smith black data processing associatesWalmart Super Center
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Walmart Super Center
 
Resume of ken smith black data procsssing associates
Resume of ken smith black data procsssing associatesResume of ken smith black data procsssing associates
Resume of ken smith black data procsssing associatesWalmart Super Center
 
Data entry representative resume may 26, 2012
Data entry  representative  resume may 26, 2012Data entry  representative  resume may 26, 2012
Data entry representative resume may 26, 2012Walmart Super Center
 
Kenneth Smith Has Completed The Kenexa Prove It! Typing General [5 Minutes ...
Kenneth Smith Has Completed The Kenexa Prove It! Typing   General [5 Minutes ...Kenneth Smith Has Completed The Kenexa Prove It! Typing   General [5 Minutes ...
Kenneth Smith Has Completed The Kenexa Prove It! Typing General [5 Minutes ...Walmart Super Center
 
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003 Normal...
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003   Normal...Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003   Normal...
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003 Normal...Walmart Super Center
 

More from Walmart Super Center (20)

Resume of ken smith black data procsssing associates 8 9 2015
Resume of ken smith black data procsssing associates  8 9 2015Resume of ken smith black data procsssing associates  8 9 2015
Resume of ken smith black data procsssing associates 8 9 2015
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015
 
Paycation travel cover kenneth smith
Paycation travel cover kenneth smithPaycation travel cover kenneth smith
Paycation travel cover kenneth smith
 
Kensmith.paycationonline.com
Kensmith.paycationonline.comKensmith.paycationonline.com
Kensmith.paycationonline.com
 
Paycation travel agent info
Paycation travel agent infoPaycation travel agent info
Paycation travel agent info
 
Travel kenneth smith
Travel kenneth smithTravel kenneth smith
Travel kenneth smith
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015
 
Paycation travel agent info
Paycation travel agent infoPaycation travel agent info
Paycation travel agent info
 
Cover letter kenneth smith black data processing associates
Cover letter kenneth smith black data processing associatesCover letter kenneth smith black data processing associates
Cover letter kenneth smith black data processing associates
 
Blacks in government membership
Blacks in government membershipBlacks in government membership
Blacks in government membership
 
Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015Resume of ken smith black data procsssing associates 1 14 2015
Resume of ken smith black data procsssing associates 1 14 2015
 
Paycation travel agent info
Paycation travel agent infoPaycation travel agent info
Paycation travel agent info
 
Resume of ken smith black data procsssing associates
Resume of ken smith black data procsssing associatesResume of ken smith black data procsssing associates
Resume of ken smith black data procsssing associates
 
Data entry representative resume may 26, 2012
Data entry  representative  resume may 26, 2012Data entry  representative  resume may 26, 2012
Data entry representative resume may 26, 2012
 
Resume Arrow Kenneth Smith
Resume Arrow Kenneth SmithResume Arrow Kenneth Smith
Resume Arrow Kenneth Smith
 
Resumearrow.Com
Resumearrow.ComResumearrow.Com
Resumearrow.Com
 
Resumearrow.Com
Resumearrow.ComResumearrow.Com
Resumearrow.Com
 
Kenneth Smith Has Completed The Kenexa Prove It! Typing General [5 Minutes ...
Kenneth Smith Has Completed The Kenexa Prove It! Typing   General [5 Minutes ...Kenneth Smith Has Completed The Kenexa Prove It! Typing   General [5 Minutes ...
Kenneth Smith Has Completed The Kenexa Prove It! Typing General [5 Minutes ...
 
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003 Normal...
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003   Normal...Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003   Normal...
Kenneth Smith Has Completed The Kenexa Prove It! Microsoft Word 2003 Normal...
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Pre Test Results Introduction To Pc Security

  • 1.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityresources: pre-test results Pre-TestEvaluation of your answers:Which method of Internet connection is the most secure?You chose: DSL.Correct! DSL is the most secure type of connection but it still has vulnerabilities.What do the terms 802.3 and 802.11 refer to?You chose: Hardwire and wireless network connection standards.Correct! 802.3 is the hardwired Ethernet connection and 802.11 is a wireless connection standard. How many layers are there in the OSI model?You chose: 7.Correct! There are seven layers to the OSI model.What is the difference between a virus and a worm?You chose: A virus requires human intervention to acquire where a worm can travel on its own and does not require a host file.Correct! Viruses do require human intervention to acquire while worms can move on their own and do not require a host file. Which scumware, malware, adware, or spyware lies to the computer that what it's seeing doesn't really exist?You chose: A rootkit program.Correct! A rootkit program hides from the computer by lying to it and telling the PC that the program it sees doesn't really exist. What is a universal vulnerability?You chose: A vulnerability that creates a known flaw in the security of a PC system or network.Correct! A vulnerability is universal when an operating system, software application, or some other programming code creates a known flaw in the security of a PC system or network.What is a SYN Flood attack?You chose: A method of flooding a computer with packets containing the address, port and information for communications.Correct! A SYN flood attack sends a flood of synchronized (SYN) packets containing the address, port, and other information necessary to communicate with the computer. What is the best protection for network security?You chose: A router with a built-in firewall and a software firewall.Correct! A router with built-in firewall can stop the packets from entering the network completely, while a software firewall will provide additional protection to individual PCs from spoofed packets slipping past the routers built-in firewall.In business, why do you need to worry about providing effective security for your network?You chose: Because of new laws governing the safe storage of personally identifying information.Correct! New legislation is appearing all the time that governs the safe storage of credit card information and personally identifying information. Failure to do so, could result in a business being liable for the financial loss to the customer.What do you call the new technology used in laptop engineering and design?You chose: Mobile.Correct! Mobile technology is the term used for the concept of designing lighter weight laptops with extended life batteries and wireless access. In computing terms, what does the term 'virtual' mean?You chose: Being in essence or effect, but not in fact.Correct! The term 'virtual' in computing has taken on the meaning from Webster's dictionary, which means being in essence or effect, but not fact. Why should you verify that antivirus software definitions have been updated when you do a security check?You chose: It verifies that nothing has interrupted the proper operation of the software.Correct! If the virus definitions are outdated and the auto-update is still enabled, it may indicate a virus is blocking the normal function of the software. Your score: 100% (out of 100%). Excellent job!Pre-TestDate submitted: 10/23/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.