Prev 1 2 3 4 5 Next
11. VIRUS stands for
A. Vital Information Resources Under Siege
B. Vital Information Reason Under Siege
C. Vital Information Recourse Under System
D. Virus Information Resources Under Siege
ANSWER:A
SOLUTION: VIRUS stands for Vital Information Resources Under Siege. It’s a type of malicious software or malware that can damage data, files, and software by replicating itself.
12.What is the virus that spread in computer?
A. It is hardware
B. It is system software
C. It is a computer program
D. It is a windows tool
ANSWER:C
SOLUTION:It is a computer program
13. What is the first boot sector virus?
A. Brain
B. Mind
C. ELK cloner
D. None of the above
ANSWER:C
SOLUTION:The Elk Cloner virus is the first known boot sector virus. In 1982, 15-year-old Richard Skrenta created the virus for the Apple II operating system as a practical joke.
14. Firewalls are to protect against
A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
ANSWER:D
SOLUTION: Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.
15. Which one of the following is a key function of firewall?
A. Copying
B. Moving
C. Deleting
D. Monitoring
ANSWER: D
SOLUTION: Firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and untrusted external network like the internet.
16. Unauthorized copying of software to be used for personal gain of personal backups is called____.
A. Program looting
B. Program thievery
C. Data snatching
D. Software piracy
ANSWER:D
SOLUTION: Software piracy: Illegal copying, distribution, or use of software.
17. Abuse messaging systems to send unsolicited is ____.
A. Phishing
B. Adware
C. Firewall
D.Spam
ANSWER:D
SOLUTION:Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoaxes or other undesirable contents such as links to phishing sites.
18. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a ____.
A. Hacker
B. Analyst
C. Spammer
D. Programmer
ANSWER:A
SOLUTION: A hacker is a person who uses his or her expertise to gain access to other peoples computers to get information illegally or do damage.
19. A hacker contacts your phone or E-mails and attempts to acquire your password is called ____.
A. Spamming
B. Bugging
C. Spoofing
D. Phishing
ANSWER:D
SOLUTION: Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.