Q1.
VIRUS stands for___.
(a)
Vital Information Resources Under Siege
(b)
Viral Important Record User Searched
(c)
Very Interchanged Result Until Source
(d)
Very Intelligent Resources Under Search
(e)
None of these
Q2.
To protect yourself from computer hacker, you should turn on a
__________.
(a)
Firewall
(b)
Script
(c)
VLC
(d)
AUP
(e)
Antivirus
Q3.
A virus that migrates freely within a large population of
unauthorized email user is called a __________.
(a)
worm
(b)
flame war
(c)
macro
(d)
plagiarism
(e)
None of these
Q4.
A __________ is one of thousands of programs that can invade computer
and perform a variety of functions ranging from annoying (e.g.,
popping up messages as a joke) to dangerous (e.g., deleting files or
destroying your hard disk).
(a)
MS Access
(b)
MS Word
(c)
Antivirus
(d)
Computer Virus
(e)
None of these
Q5.
What is short name for malicious software (i.e. software designed to
disrupt computer operation, gather sensitive information, or gain
unauthorized access to computer systems)?
(a)
Moleculewar
(b)
Malisoft
(c)
Malairasoft
(d)
Malware
(e)
None of these
Q6.
__________ means to prove/verify the identity of the entity that
tries to access the system’s resources.
(a)
Entity authentication
(b)
Message authentication
(c)
Password authentication
(d)
All of the above
(e)
None of these
Q7.
What is the name of the viruses that fool a user into downloading
and/or executing them by pretending to be useful applications?
(a)
Cracker
(b)
Worm
(c)
Trojan horses
(d)
Keylogger
(e)
None of these
Q8.
Which of the following is/are threat(s) for electronic payment
system?
(a)
Trojan horse
(b)
Computer virus
(c)
Computer worms
(d)
All of the above
(e)
None of these
Q9.
Which of the following virus overtake computer system, when it boots
and destroy information?
(a)
Trojan
(b)
System infectors
(c)
Stealth virus
(d)
Boot infectors
(e)
None of these
Q10.
Which of the following describes programs that can run independently
travel from system to system and disrupt computer communication?
(a)
Trojans
(b)
Viruses
(c)
Worm
(d)
Droppers
(e)
All of these
Q11.
The first Computer Virus is __________.
(a)
Creeper
(b)
Sasser
(c)
Blaster
(d)
All of the above
(e)
None of these
Q12.
McAfee is an example of __________.
(a)
Virus
(b)
Antivirus
(c)
Word Processing Software
(d)
Photo Editing Software
(e)
None of these
Q13.
__________ are attempt by individuals to obtain confidential
information from you by falsifying their identity.
(a)
Phishing trips
(b)
Computer viruses
(c)
Spyware scams
(d)
Viruses
(e)
Phishing scams
Q14.
In digital signature, the private key is used for __________ and the
public key for __________.
(a)
encryption, decryption
(b)
decryption, encryption
(c)
plaintext, ciphertext
(d)
ciphertext, plaintext
(e)
None of these
Q15.
Which of the following would most likely not be a symptom of a virus?
(a)
Existing program files and icons disappear
(b)
The CD-ROM stops functioning
(c)
The web browser opens to an unusual home page
(d)
Odd message or images are displayed on the screen
(e)
None of these
Solutions
S1.
Ans.(a)
Sol.
VIRUS stands for Vital Information Resources Under Siege
S2.
Ans.(a)
Sol.
A firewall is a network security system, either hardware- or
software-based, that controls incoming and outgoing network traffic
based on a set of rules. It is also used to protect a computer from
hacker.
S3.
Ans.(c)
Sol.
A macro virus is a virus that is written in a macro language: a
programming language which is embedded inside a software application
(e.g., word processors and spreadsheet applications)
S4.
Ans.(d)
Sol.
A computer virus is a program or piece of code that is loaded onto
your computer without your knowledge and runs against your wishes.
Viruses can also replicate themselves.
S5.
Ans.(d)
Sol.
Malware, short for malicious software, is any software used to
disrupt computer operations, gather sensitive information, gain
access to private computer systems, or display unwanted advertising.
S6.
Ans.(a)
Sol.
Entity authentication is a technique designed to let one party prove
the identity of another party. An entity can be a person, a process,
a client, or a server.
S7.
Ans.(c)
Sol.
Trojan, is any malicious computer program which is used to hack into
a computer by misleading users of its true intent
S8.
Ans.(d)
Sol.
Virus, worms and Trojan horse these all are the threat for the
electronic payment system because these are used to access the secret
information.
S9.
Ans.(c)
Sol.
A stealth virus is a hidden computer virus that attacks operating
system processes and averts typical anti-virus or anti-malware scans.
Stealth viruses hide in files, partitions and boot sectors and are
adept at deliberately avoiding detection.
S10.
Ans.(c)
Sol.
A computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers. Often, it
uses a computer network to spread itself, relying on security
failures on the target computer to access it.
S11.
Ans.(a)
Sol.
Creeper virus is a computer virus that is most commonly recognized as
the first computer virus.
S12.
Ans.(b)
Sol.
McAfee is an Antivirus.
S13.
Ans.(e)
Sol.
Phishing scams are attempt by individuals to obtain confidential
information by falsifying their identity
S14.
Ans.(a)
Sol.
In digital signature, the private key is used for encryption and the
public key for decryption.
S15.
Ans.(b)
Sol.
Except option b all are the symptoms of a computer virus.
No comments:
Post a Comment