Machine Security
Network Security
Internet Security
E-Commerce
HTML
100
This is commonly packaged with a new computer system.
What is a Rescue Disk
100
This type of permissions provide registered users with access to the files they need, while restricting access to private resources.
What is User Permissions
100
Worms, viruses, and spyware are examples of this.
What is Malware
100
This is the best-known e-cash provider.
What is PayPal
100
Who is making the Web standards?
What is the W3C: World Wide Web Consortium
200
This secures data when it is stored and transported over a network.
What is Encryption
200
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of what?
What is unintentional data-entry error
200
These are the colors of the hats of hackers that categorize what side of security they're on
What are White, Grey, and Black
200
An example of this type of e-commerce allows customers to compete, such as on eBay
What is Online Auction Sites
200
What is the preferred way for adding a background color in HTML?
What is using Cascading Styles
300
An item such as a smart card is an example of this form of authentication.
What is Something You Have
300
This person's job is to oversee and manage a company’s computer network.
What is a Network Administrator
300
This type of computer has had a "back door" unknowingly put on it, allowing attackers to connect to it and remotely control it
What is a Zombie Computer
300
Global supply management companies assist businesses in finding the best type of these relationships.
What is B2B
300
This is the correct HTML tag for the largest heading
What is <h1>
400
This is an individual who illegally downloads copyright-protected software.
What is a Pirate
400
This type of Malware self replicates and spreads itself across a network, commonly through Email.
What is a Worm
400
An e-mail with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of this type of scam.
What is Phishing
400
Some consumer groups believe that businesses go too far in monitoring users’ online activities and interests through the use of these.
What are Cookies
400
"First opened, Last closed" is the HTML rule for these types of tags.
What are Nested Tags
500
This is the most common form of authentication.
What is a Password
500
These can be configured to help protect your security in a Wi-Fi network.
What are Access Points
500
Software companies rely on these to “fix” problems in their programs related to bugs and flaws.
What are Updates
500
Individual consumers use this form of e-commerce to sell to other individuals on the Web.
What is C2C
500
The very last thing on your HTML page should be this closing tag.
What is </html>
M
e
n
u