Firewalls are used to protect against ______
A)
Unauthorised Attacks
done
clear
B)
Virus Attacks
done
clear
C)
Data Driven Attacks
done
clear
D)
Fire Attacks
done
clear
E)
None of these
done
clear
View Answer play_arrow
A program designed to destroy data on your computer which can travel to "infect" other computers is called a _______.
A)
disease
done
clear
B)
torpedo
done
clear
C)
Hurricane
done
clear
D)
virus
done
clear
E)
Mouse
done
clear
View Answer play_arrow
What is the most common way to get a virus in your computer's hard disk?
A)
By installing games from their CDROMS
done
clear
B)
By uploading pictures from mobile phones to the computer
done
clear
C)
By opening emails
done
clear
D)
By sending emails
done
clear
E)
None of these
done
clear
View Answer play_arrow
Hackers
A)
All have the same motive
done
clear
B)
Is another name for users
done
clear
C)
May legally break into computers as long as they do not do any damage
done
clear
D)
Are people who are allergic to computers
done
clear
E)
break into other people's computers
done
clear
View Answer play_arrow
A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a_____.
A)
Spammer
done
clear
B)
hacker
done
clear
C)
Instant messenger
done
clear
D)
All of these
done
clear
E)
None of these
done
clear
View Answer play_arrow
__________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
A)
Phishing scams
done
clear
B)
Computer viruses
done
clear
C)
Special function cards
done
clear
D)
Scanners
done
clear
E)
Keyboards
done
clear
View Answer play_arrow
There are several primary categories of procedures. Which of the following is not a primary category of procedures?
A)
Testing
done
clear
B)
Backup and recovery.
done
clear
C)
Firewall development
done
clear
D)
Design
done
clear
E)
None of these
done
clear
View Answer play_arrow
Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _______ security is concerned with protecting software from unauthorised tampering or damage.
A)
Data
done
clear
B)
cyber
done
clear
C)
Internet
done
clear
D)
metaphysical
done
clear
E)
Publicity
done
clear
View Answer play_arrow
Unauthorised copying of software to be used for personal gain instead of personal backups is called
A)
Program thievery
done
clear
B)
data snatching
done
clear
C)
Software piracy
done
clear
D)
program looting
done
clear
E)
Data looting
done
clear
View Answer play_arrow
Which of the following are the solutions to network security? (i) Encryption (ii) Authentication (iii) Authorization (iv) Non-repudiation
A)
i, ii and iii only
done
clear
B)
ii, iii and iv only
done
clear
C)
i, iii and iv only
done
clear
D)
i, iii only
done
clear
E)
All i, ii, iii and iv
done
clear
View Answer play_arrow
_______ are often delivered to a PC through an email attachment and are often designed to do harm.
A)
Viruses
done
clear
B)
Spam
done
clear
C)
Portals
done
clear
D)
Email messages
done
clear
E)
None of these
done
clear
View Answer play_arrow
Which one of the following would be considered as a way that a computer virus can enter a computer system?
A)
Opening an application previously installed on the computer
done
clear
B)
Borrowed an illegal copy of software
done
clear
C)
Viewing a website without causing any additional transactions
done
clear
D)
Running antivirus programs
done
clear
E)
None of these
done
clear
View Answer play_arrow
A ___ is anything that can cause harm.
A)
Vulnerability
done
clear
B)
phishing
done
clear
C)
Threat
done
clear
D)
spoof
done
clear
E)
None of these
done
clear
View Answer play_arrow
A __ is a small program embeded inside of a GIF image.
A)
Web bug
done
clear
B)
Cookie
done
clear
C)
Spyware applications
done
clear
D)
Spam
done
clear
E)
None of these above
done
clear
View Answer play_arrow
A hacker contacts your phone or E-mails and attempts to acquire your password is called
A)
Spoofing
done
clear
B)
phishing
done
clear
C)
Spamming
done
clear
D)
buging
done
clear
E)
None of these
done
clear
View Answer play_arrow
The phrase ______ describes viruses, worms, trojan horse attack applets and attack scripts.
A)
Malware
done
clear
B)
spam
done
clear
C)
Phishing
done
clear
D)
virus
done
clear
E)
None of these
done
clear
View Answer play_arrow
Hackers often gain entry to a network be pretending to be at a legitimate computer
A)
Spoofing
done
clear
B)
forging
done
clear
C)
IP spoofing
done
clear
D)
None of these
done
clear
E)
None of these
done
clear
View Answer play_arrow
The main reason to encrypt a file is to
A)
Reduce its size
done
clear
B)
Secure it for transmission
done
clear
C)
Prepare it for backup
done
clear
D)
Include it in the start-up sequence
done
clear
E)
None of the above
done
clear
View Answer play_arrow
Which one of the following is a cryptographic protocol used to secure http connection?
A)
Stream Control Transmission Protocol (SCTP)
done
clear
B)
Transport Layer Security (TLS)
done
clear
C)
Explicit Congestion Notification (FCN)
done
clear
D)
Resource Reservation Protocol (RRP)
done
clear
E)
None of the above
done
clear
View Answer play_arrow
______ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
A)
Stealth
done
clear
B)
Polymorphic virus
done
clear
C)
Parasitic virus
done
clear
D)
Macro virus
done
clear
E)
None of these
done
clear
View Answer play_arrow
The first PC virus was developed in
A)
1980
done
clear
B)
1984
done
clear
C)
1986
done
clear
D)
1988
done
clear
E)
1987
done
clear
View Answer play_arrow
Abuse messaging systems to send unsolicited is
A)
Phishing
done
clear
B)
spam
done
clear
C)
Malware
done
clear
D)
firewall
done
clear
E)
Adware
done
clear
View Answer play_arrow
_______ are often delivered to PC through an E-mail attachment and are often designed to do harm.
A)
Viruses
done
clear
B)
Spam
done
clear
C)
Portals
done
clear
D)
Email messages
done
clear
E)
None of these
done
clear
View Answer play_arrow
Which one of the following is a key function of firewall?
A)
Monitoring
done
clear
B)
Deleting
done
clear
C)
Copying
done
clear
D)
Moving
done
clear
E)
None of these
done
clear
View Answer play_arrow
The first computer virus is
A)
Creeper
done
clear
B)
PARAM
done
clear
C)
The famous
done
clear
D)
HARLIE
done
clear
E)
Brain
done
clear
View Answer play_arrow
A time bomb occurs during a particular
A)
Data or time
done
clear
B)
logic and data
done
clear
C)
Only time
done
clear
D)
All of the above
done
clear
E)
None of these
done
clear
View Answer play_arrow
First boot sector virus is
A)
Computed
done
clear
B)
mind
done
clear
C)
brian
done
clear
D)
Elk Cloner
done
clear
E)
None of these
done
clear
View Answer play_arrow
Which virus spreads in application software?
A)
Macro virus
done
clear
B)
Boot virus
done
clear
C)
File virus
done
clear
D)
Anti- virus
done
clear
E)
None of the above
done
clear
View Answer play_arrow
Some viruses have delayed payload, which is sometimes called a
A)
Time
done
clear
B)
anti-virus
done
clear
C)
Bomb
done
clear
D)
All of these
done
clear
E)
None of these
done
clear
View Answer play_arrow
An anti-virus is a
A)
Program code
done
clear
B)
Computer
done
clear
C)
Company name
done
clear
D)
Application software
done
clear
E)
None of these
done
clear
View Answer play_arrow
'Trend Micro' is a
A)
Virus program
done
clear
B)
Anti-virus software
done
clear
C)
Just a program
done
clear
D)
All of these
done
clear
E)
None of the above
done
clear
View Answer play_arrow
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
A)
Keylogger
done
clear
B)
Worm
done
clear
C)
Virus
done
clear
D)
Cracker
done
clear
E)
None of the above
done
clear
View Answer play_arrow
Like a virus, it is a self-replicating program. It also propagates through computer network.
A)
Spyware
done
clear
B)
Worm Cracker
done
clear
C)
Cracker
done
clear
D)
phishing scam
done
clear
E)
None of these
done
clear
View Answer play_arrow
Passwords enables user to
A)
Get into the system quickly
done
clear
B)
Make efficient use of time
done
clear
C)
Retain confidentiality of files
done
clear
D)
Simplify file structure
done
clear
E)
None of thee above
done
clear
View Answer play_arrow
A program designed to destroy data on your compute which can travel to infect other computers, is called is
A)
Disease
done
clear
B)
torpedo
done
clear
C)
Hurricane
done
clear
D)
virus
done
clear
E)
None of these
done
clear
View Answer play_arrow