Prev 1 2 3 4 5 Next
31. Viruses, Trojan horses and worms are ____.
A. Able to harm computer system
B. Unable to detect if present on computer
C. User-friendly applications
D. Harmless applications resident on computer
ANSWER:A
SOLUTION:Able to harm computer system
32. If your computer rebooting itself then it is likely that ____.
A. It has a virus
B. It does not have enough memory
C. There is no printer
D. There has been a power surge
ANSWER:A
SOLUTION:the most likely reason for a computer repeatedly rebooting itself is a virus or malware infection.
33. ____ refers to privileges that allow a user to read, write or execute a file.
A. Authentication
B. File access permission
C. Password
D. Firewall
ANSWER:B
SOLUTION:File permissions refer to privileges that allow a user to read, write or execute a file.
34. Hackers ____.
A.All have same motive
B. Are another name of users
C.Break into other people’s computer
D. Are people who are allergic to computers
ANSWER:C
SOLUTION: A hacker is a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more
35. Which of the following is the combination of numbers, alphabet along with username used to get access to user account?
A. Password
B. Username
C. Titlename
D. Host-Id
ANSWER: A
SOLUTION:The combination of numbers, alphabets along with username used to get access to a user account is a Password.
36. An act of sending e-mails or creating webpages that are designed to collect and individual’s online bank, credit card or other login information?
A. Phishing
B. Spam
C. Hacking
D. Cracking
ANSWER:A
SOLUTION: Email Phishing aka “deceptive phishing” refers to a fraudster who creates and sends deceptive emails with the goal of obtaining sensitive financial and personal information.
37.Junk E-mail is also called____.
A. Spam
B. Spoof
C. Sniffer script
D. All of these
ANSWER:A
SOLUTION:Junk email is also known as spam, spam mail, or unsolicited bulk email (UBE). Spam is the common name for unwanted and unrequested email.
38. Adware is something
A. Which is added to your communication
B. By adding this performance of your computer increases
C. Software that gets different advertisement
D. None of above
ANSWER:C
SOLUTION: Software that gets different advertisement
39. Coded entries which are used to gain access to a computer system are called ____.
A. Entry codes
B. Passwords
C. Security commands
D. Code words
ANSWER:B
SOLUTION:Coded entries used to gain access to a computer system are called passwords. Passwords are encrypted codes that allow access to a computer system.