-
question_answer1)
What are the two important categories of resident virus?
A)
Fast infectors, slow infectors done
clear
B)
Macro infectors, micro infectors done
clear
C)
Primary infectors, secondary infectors done
clear
D)
File infectors, drive infectors done
clear
View Solution play_arrow
-
question_answer2)
Which of the following software not only interrupts the normal working of a computer but also steals important data from it?
A)
Antivirus software done
clear
B)
Operating system done
clear
C)
Antiware done
clear
D)
Malware done
clear
View Solution play_arrow
-
question_answer3)
Which of the following technologies uses encryption to protect the privacy of all your data transmissions between two points?
A)
Secure Socket Layer done
clear
B)
Virtual Private Network done
clear
C)
Transport Layer Security done
clear
D)
All of these done
clear
View Solution play_arrow
-
question_answer4)
When you copy the address book contents of one of your mobile phones to another mobile phone, where both your phones are in your two hands, you may be using ____ technology.
A)
Parallel done
clear
B)
Bluetooth done
clear
C)
Fidelity done
clear
D)
Personal done
clear
View Solution play_arrow
-
question_answer5)
Identify the virus. |
1. It was distributed by David L. Smith. |
2. It was distributed as e-mail attachment. |
A)
Melissa done
clear
B)
Code Red done
clear
C)
Blue Whale done
clear
D)
ILOVEYOU done
clear
View Solution play_arrow
-
question_answer6)
Rerouting from a requested site to an undesired site without your intervention is called ______.
A)
Pharming done
clear
B)
Spamming done
clear
C)
Hijacking done
clear
D)
Trapping done
clear
View Solution play_arrow
-
question_answer7)
A low power WLAN technology that facilitates interoperability among smartphones and portable consumer devices such as headphones fitness accessories and heart rate monitor. It is also called "Bluetooth 4.0".
A)
Bluetooth Smart Ready done
clear
B)
Bluetooth Berry casting done
clear
C)
Bluetooth Handoff done
clear
D)
Podcasts done
clear
View Solution play_arrow
-
question_answer8)
The technology that creates a secure and private connection between two or more computers is called a _________.
A)
Network Tethering done
clear
B)
Encryption done
clear
C)
FTP done
clear
D)
Secure Socket Layer done
clear
View Solution play_arrow
-
question_answer9)
_____ is a software used by attackers to gain administrative rights to a computer.
A)
Root Kit done
clear
B)
BIOS done
clear
C)
Firmware done
clear
D)
Adware done
clear
View Solution play_arrow
-
question_answer10)
Identify the following: |
- It makes changes in a disk's file system. |
- It creates the illusion that virus has infected every program on the disk. |
- When a program is run from infected disk, it causes the virus to run as well. |
A)
Cluster Virus done
clear
B)
Trojan horse done
clear
C)
Melissa done
clear
D)
Morris Worm done
clear
View Solution play_arrow
-
question_answer11)
It was a computer worm whose primary's target were Internet server and it allowed attackers to have the same access to an infected machine as the current user. It was launched one week after 9/11 attack. Identify it.
A)
Melissa done
clear
B)
Code Red done
clear
C)
Nimda done
clear
D)
Sapphire done
clear
View Solution play_arrow
-
question_answer12)
To access the internet, the _________ connects your computer to your phone line and provide access to the network.
A)
Operating system done
clear
B)
Browser done
clear
C)
Modem done
clear
D)
Repeater done
clear
View Solution play_arrow
-
question_answer13)
Websites that allows you to edit / modify / create / delete content are called _______________.
A)
Homepages done
clear
B)
Digicast done
clear
C)
Podcasts done
clear
D)
Blogs done
clear
View Solution play_arrow
-
question_answer14)
A collection of websites connected with hyperlinks and that forms the part of the internet is referred as _______.
A)
Browser done
clear
B)
WWW done
clear
C)
DNS done
clear
D)
URL done
clear
View Solution play_arrow
-
question_answer15)
Deliberately modifying the return address on an e-mail such that it seems to be coming from anyone but not the actual sender is called ______.
A)
Spoofing done
clear
B)
Pharming done
clear
C)
Spamming done
clear
D)
Rootkit done
clear
View Solution play_arrow
-
question_answer16)
Match the following.
Column - I |
Column - II |
(a) Password |
(i) Detects and removes viruses and other malicious software from the computer. |
(b) Antivirus software |
(ii) Protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. |
(c) Firewall |
(iii) Secret sequence of characters that enables a user to control access to a computer program of file. |
(d) Disk Encryption |
(iv) A security system designed to protect a computer from hacker attacks. |
A)
(a) - (iv), (b) - (i), (c) - (i), (d) - (ii) done
clear
B)
(a) - (iv), (b) - (i), (c) - (ii), (d) - (iii) done
clear
C)
(a) - (iv), (b) - (iii), (c) - (i), (d) - (ii) done
clear
D)
(a) - (iii), (b) - (i), (c) - (iv), (d) - (ii) done
clear
View Solution play_arrow
-
question_answer17)
In which of the following ways computer worm spreads? |
(i) Via e-mail attachments |
(ii) Via hyperlinks to web or any such source or network |
(iii) Via peer to peer networks |
A)
Only (i) done
clear
B)
Only (ii) done
clear
C)
Only (iii) done
clear
D)
All (i), (ii) and (iii) done
clear
View Solution play_arrow
-
question_answer18)
False reports about non-existent viruses, which claims how harmful the effect would be if suggested steps mentioned in the e-mails are not taken are called ______.
A)
Hoax done
clear
B)
Browser Object done
clear
C)
Cookies done
clear
D)
Exploitholic done
clear
View Solution play_arrow
-
question_answer19)
Match the following.
Column - I |
Column - II |
(a) Username |
(i) Worldwide system of servers |
(b) Hostname |
(ii) Username@hostname |
(c) E-mail |
(iii) Unwanted e-mails |
(d) DNS |
(iv) Name given to the user |
(e) Spam |
(v) Name of the server |
A)
(a) - (iv), (b) - (v), (c) - (ii), (d) - (i), (e) - (iii) done
clear
B)
(a) - (iv), (b) - (v), (c) - (iii), (d) - (i),(e) - (ii) done
clear
C)
(a) - (v), (b) - (iv), (c) - (iii), (d) - (ii), (e) - (i) done
clear
D)
(a) - (iv), (b) - (v), (c) - (iii), (d) - (ii), (e) - (i) done
clear
View Solution play_arrow
-
question_answer20)
An antivirus is an important program for the safety of your computer, because it ___________.
A)
Prevents, defects and removes destructive programs done
clear
B)
Allocate, spread and create malware done
clear
C)
Wipes your data from hard disk done
clear
D)
Maintain the CMOS setting done
clear
View Solution play_arrow