MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Cybercrime Computer Mcq Questions Answers MCQ Quiz Questions and Answers
1.
-------- are often delivered to a PC through an email attachment and are often designed to do harm.
Spam
Email
Portals
Virus
2.
The altering of data so that it is not usable unless the changes are undone is
ergonomics
compression
biometrics
encryption
3.
When a logic bomb is activated by a time related event, it is known as -------
virus
trojan horse
time related bomb sequence
time bomb
4.
A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard disk).
Ms Word
Ms Access
Antivirus
Computer Virus
5.
A -------- is a computer program that can replicate itself and spread from one computer to another.
Antivurs
PenDrive
Mouse
Computer Virus
6.
Authentication is
modification
insertion
hard to assure identity of user on a remote system
none of the above
7.
-------- are attempts by individuals to obtain confidential information from you to falsifying their identity.
Computer viruses
Phishing scams
Phishing trips
Spyware scams
8.
A virus that migrates freely within a large population of unauthorized email user is called a -------
flame war
worm
macro
plagiarism
9.
Which of the following virus overtake computer system, when it boots and destroy information?
System infectors
Trojan
Boot infectors
Stealth virus
10.
Key logger is a
Firmware
Antivirus
Spyware
All of the above
11.
To protect yourself from computer hacker, you should turn on a
Script
Firewall
VLC
Antivirus
12.
Firewalls are used to protect against --------
data driven attacks
fire attacks
virus attacks
unauthorised access
13.
Which of the following would most likely not be a symptom of a virus?
The web browser opens to an unusual home page
Odd message or images are displayed on the screen
Existing program files and icons disappear
The CD–ROM stops functioning
14.
Code red is a(n) ----------
Word Processing Software
Antivirus
Virus
Photo Editing Software
15.
-------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.
Firmmware
Adware
Keylogger
Antivirus
16.
Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
Viruses
Trojans
Droppers
Worm
17.
VIRUS stands for
Very Intelligent Result Until Source
Very Interchanged Resource Under Search
Vital Information Resource Under Slege
Viral Important Record User Searched
18.
Which of the following is not an antivirus software?
AVG
Avast
Code Red
MCAfee
19.
What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
Malware
Moleculewar
Malisoft
Malairasoft
20.
Which of the following is/are threats for electronic payment systems?
Computer worms
Computer virus
Trojan horse
All of the above
21.
The first computer
I Love You
Blaster
Sasser
Creeper
22.
is an example of
Photo Editing Software
Quick Heal
Virus
Antivirus
23.
Which of the following is known as Malicious software?
illegalware
badware
malware
maliciousware
24.
To protect a computer from virus, you should install -------- in your computer.
backup wizard
disk cleanup
antivirus
disk defragmenter
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page