• 1. 
    -------- are often delivered to a PC through an email attachment and are often designed to do harm.

  • Spam
  • Email
  • Portals
  • Virus
  • 2. 
    The altering of data so that it is not usable unless the changes are undone is

  • ergonomics
  • compression
  • biometrics
  • encryption
  • 3. 
    When a logic bomb is activated by a time related event, it is known as -------

  • virus
  • trojan horse
  • time related bomb sequence
  • time bomb
  • 4. 
    A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard disk).

  • Ms Word
  • Ms Access
  • Antivirus
  • Computer Virus
  • 5. 
    A -------- is a computer program that can replicate itself and spread from one computer to another.

  • Antivurs
  • PenDrive
  • Mouse
  • Computer Virus
  • 6. 
    Authentication is

  • modification
  • insertion
  • hard to assure identity of user on a remote system
  • none of the above
  • 7. 
    -------- are attempts by individuals to obtain confidential information from you to falsifying their identity.

  • Computer viruses
  • Phishing scams
  • Phishing trips
  • Spyware scams
  • 8. 
    A virus that migrates freely within a large population of unauthorized email user is called a -------

  • flame war
  • worm
  • macro
  • plagiarism
  • 9. 
    Which of the following virus overtake computer system, when it boots and destroy information?

  • System infectors
  • Trojan
  • Boot infectors
  • Stealth virus
  • 10. 
    Key logger is a

  • Firmware
  • Antivirus
  • Spyware
  • All of the above
  • 11. 
    To protect yourself from computer hacker, you should turn on a

  • Script
  • Firewall
  • VLC
  • Antivirus
  • 12. 
    Firewalls are used to protect against --------

  • data driven attacks
  • fire attacks
  • virus attacks
  • unauthorised access
  • 13. 
    Which of the following would most likely not be a symptom of a virus?

  • The web browser opens to an unusual home page
  • Odd message or images are displayed on the screen
  • Existing program files and icons disappear
  • The CD–ROM stops functioning
  • 14. 
    Code red is a(n) ----------

  • Word Processing Software
  • Antivirus
  • Virus
  • Photo Editing Software
  • 15. 
    -------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

  • Firmmware
  • Adware
  • Keylogger
  • Antivirus
  • 16. 
    Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

  • Viruses
  • Trojans
  • Droppers
  • Worm
  • 17. 
    VIRUS stands for

  • Very Intelligent Result Until Source
  • Very Interchanged Resource Under Search
  • Vital Information Resource Under Slege
  • Viral Important Record User Searched
  • 18. 
    Which of the following is not an antivirus software?

  • AVG
  • Avast
  • Code Red
  • MCAfee
  • 19. 
    What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?

  • Malware
  • Moleculewar
  • Malisoft
  • Malairasoft
  • 20. 
    Which of the following is/are threats for electronic payment systems?

  • Computer worms
  • Computer virus
  • Trojan horse
  • All of the above
  • 21. 
    The first computer

  • I Love You
  • Blaster
  • Sasser
  • Creeper
  • 22. 
    is an example of

  • Photo Editing Software
  • Quick Heal
  • Virus
  • Antivirus
  • 23. 
    Which of the following is known as Malicious software?

  • illegalware
  • badware
  • malware
  • maliciousware
  • 24. 
    To protect a computer from virus, you should install -------- in your computer.

  • backup wizard
  • disk cleanup
  • antivirus
  • disk defragmenter
Report Question
warning
access_time
  Time