Share Facebook Email Telegram WhatsApp Results #1. Which among the following is an area of e-mail that is short description of the message? Subject Subject Cc Cc Bcc Bcc Attachment Attachment #2. ____ is branch of information technology known as information security. Computer security Computer security Cyber security Cyber security IT security IT security All of these All of these #3. Verification of a login name and password is known as ___. Configuration Configuration Accessibility Accessibility Authentication Authentication Logging In Logging In #4. Which virus spreads in application software? Macros virus Macros virus Boot virus Boot virus File virus File virus Antivirus Antivirus #5. Attempt to gain unauthorized access to a user’s system or information by pretending to be the user? Spoofing Spoofing Hacker Hacker Cracker Cracker Phishing Phishing #6. Antivirus software is an ____. Business software Business software An operating system An operating system A security A security An office suite An office suite #7. To protect yourself from computer hacker intrusions, you should install a ____. Firewall Firewall Mailer Mailer Macro Macro Script Script #8. Mechanism to protect the network from outside attack is ____. Firewall Firewall Antivirus Antivirus Digital signature Digital signature Formatting Formatting #9. Which was the first PC boot sector virus? Creeper Creeper Trojan Trojan Brain Brain None of these None of these #10. Illegal copying and distribution of software is ______. Hacking Hacking Software piracy Software piracy Cracking Cracking Copyright Copyright Finish