Q. 1
Which of the following is an anti-virus program?
(A) Norton
(B) AVAST
(C) Quick Heal
(D) All of the above
Answer: (D) All of the above
Explanation: N/A
Q. 2
Unsolicited commercial E-Mail is known as
(A) Spam
(B) Malware
(C) Virus
(D) Spyware
Answer: (A) Spam
Explanation: N/A
Q. 3
The first computer virus is
(A) Creeper
(B) Trojan
(C) PARAM
(D) Morris
Answer: (A) Creeper
Explanation: N/A
Q. 4
Software such as Virus, Worms and Trojan Horses that has a malicious content is known as
(A) Malicious software (malware)
(B) Spyware
(C) Firewall
(D) Spyware
Answer: (A) Malicious software (malware)
Explanation: N/A
Q. 5
All of the following are examples real security and privacy risks except
(A) Hackers
(B) Spam
(C) Viruses
(D) Identity theft
Answer: (B) Spam
Explanation: N/A
Q. 6
It protects a network from potential malicious attacks, and also limit offensive web site or questionable e-mail attachments.
(A) Firewall
(B) Antivirus
(C) Cookies
(D) Malware
Answer: (A) Firewall
Explanation: N/A
Q. 7
_______________ are people who break into another person’s computer with malicious intentions.
(A) Hackers
(B) Crackers
(C) Virus
(D) Malware
Answer: (A) Hackers
Explanation: N/A
Q. 8
A secret word that you set to protect a file or your computer
(A) Password
(B) User id
(C) Cookies
(D) PIN
Answer: (A) Password
Explanation: N/A
Q. 9
The process of converting data into symbols as a safeguard against hackers and crackers is called
(A) Encryption
(B) Antivirus
(C) Decryption
(D) Decipher
Answer: (A) Encryption
Explanation: N/A
Q. 10
______________ are people who breakt into computers, cause damage and steal data.
(A) Hackers
(B) Crackers
(C) Virus
(D) Spyware
Answer: (B) Crackers
Explanation: N/A
Q. 11
________________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Spyware scams
(C) Phishing scams
(D) Viruss
Answer: (A) Phishing trips
Explanation: N/A
Q. 12
Viruses, trojan horses and worms are
(A) Able to harm a computer system
(B) Unable to detect if present on computer
(C) User-friendly applications
(D) Harmless applications resident of computer
Answer: (A) Able to harm a computer system
Explanation: N/A
Q. 13
The unauthorised copying and distributing of software is known as
(A) Cracking
(B) Software piracy
(C) Software literacy
(D) Cracking
Answer: (B) Software piracy
Explanation: N/A
Q. 14
Verification of a login name and password is known as
(A) Configuration
(B) Authentication
(C) Logging in
(D) Accessibility
Answer: (B) Authentication
Explanation: N/A
Q. 15
Computer virus is
(A) A hardware
(B) Windows tool
(C) A computer program
(D) A system software
Answer: (C) A computer program
Explanation: N/A