Thursday, 25 October 2018

Daily Computer Quiz : 26/10/2018


Q1. VIRUS stands for___.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these

Q2. To protect yourself from computer hacker, you should turn on a __________.
(a) Firewall
(b) Script
(c) VLC
(d) AUP
(e) Antivirus

Q3. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these

Q4. A __________ is one of thousands of programs that can invade computer and perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk).
(a) MS Access
(b) MS Word
(c) Antivirus
(d) Computer Virus
(e) None of these

Q5. What is short name for malicious software (i.e. software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
(a) Moleculewar
(b) Malisoft
(c) Malairasoft
(d) Malware
(e) None of these

Q6. __________ means to prove/verify the identity of the entity that tries to access the system’s resources.
(a) Entity authentication
(b) Message authentication
(c) Password authentication
(d) All of the above
(e) None of these

Q7. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
(a) Cracker
(b) Worm
(c) Trojan horses
(d) Keylogger
(e) None of these

Q8. Which of the following is/are threat(s) for electronic payment system?
(a) Trojan horse
(b) Computer virus
(c) Computer worms
(d) All of the above
(e) None of these

Q9. Which of the following virus overtake computer system, when it boots and destroy information?
(a) Trojan
(b) System infectors
(c) Stealth virus
(d) Boot infectors
(e) None of these
Q10. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
(a) Trojans
(b) Viruses
(c) Worm
(d) Droppers
(e) All of these

Q11. The first Computer Virus is __________.
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these

Q12. McAfee is an example of __________.
(a) Virus
(b) Antivirus
(c) Word Processing Software
(d) Photo Editing Software
(e) None of these

Q13. __________ are attempt by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing trips
(b) Computer viruses
(c) Spyware scams
(d) Viruses
(e) Phishing scams

Q14. In digital signature, the private key is used for __________ and the public key for __________.
(a) encryption, decryption
(b) decryption, encryption
(c) plaintext, ciphertext
(d) ciphertext, plaintext
(e) None of these

Q15. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these

Solutions

S1. Ans.(a)
Sol. VIRUS stands for Vital Information Resources Under Siege

S2. Ans.(a)
Sol. A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. It is also used to protect a computer from hacker.

S3. Ans.(c)
Sol. A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

S4. Ans.(d)
Sol. A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.

S5. Ans.(d)
Sol. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

S6. Ans.(a)
Sol. Entity authentication is a technique designed to let one party prove the identity of another party. An entity can be a person, a process, a client, or a server.

S7. Ans.(c)
Sol. Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent

S8. Ans.(d)
Sol. Virus, worms and Trojan horse these all are the threat for the electronic payment system because these are used to access the secret information.

S9. Ans.(c)
Sol. A stealth virus is a hidden computer virus that attacks operating system processes and averts typical anti-virus or anti-malware scans. Stealth viruses hide in files, partitions and boot sectors and are adept at deliberately avoiding detection.

S10. Ans.(c)
Sol. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

S11. Ans.(a)
Sol. Creeper virus is a computer virus that is most commonly recognized as the first computer virus.

S12. Ans.(b)
Sol. McAfee is an Antivirus.

S13. Ans.(e)
Sol. Phishing scams are attempt by individuals to obtain confidential information by falsifying their identity

S14. Ans.(a)
Sol. In digital signature, the private key is used for encryption and the public key for decryption.

S15. Ans.(b)
Sol. Except option b all are the symptoms of a computer virus.



No comments:

Post a Comment