Computer Security

A program that interferes with normal functioning of the computer is called:

  • (a) Bacteria
  • (b) Virus
  • (c) Firmware
  • (d) Infection
Check Answer
  • (b) Virus

This is not a computer virus:

  • (a) Norton
  • (b) Rudolf
  • (c) Chernobyl
  • (d) All are computer virus
Check Answer
  • (a) Norton

________ occurs when a person sends a message (or many messages) with angry or antagonistic content.

  • (A) Flaming
  • (B) Email Bankruptcy
  • (C) Email Phishing
  • (D) Email fatigue
Check Answer
  • (A) Flaming

Protecting computers and the information they contain against unwanted access, damage, modification or destruction is called:

  • (A) Computer monitoring  
  • (B) Audit control
  • (C) Electronic policing.
  • (D) Computer security
Check Answer
  • (D) Computer security

Restricted access to the server computer room is a form of:

  • (A) Logical security
  • (B) Physical security
  • (C) Enterprise security
  • (D) User security
Check Answer
  • (B) Physical security

The measurement of things such as fingerprints and retinal scans used for security access is called:

  • (A) Bio-metrics
  • (B) Computer security
  • (C) Bio-measurement
  • (D) Smart weapon machinery
Check Answer
  • (A) Bio-metrics

This is not a bio-metric technique:

  • (A) Badge
  • (B) Retina
  • (C) Face
  • (D) Palm print
Check Answer
  • (A) Badge

Which of the following is the most devastating loss to a company?

  • (A) Loss of hardware
  • (B) Loss of data
  • (C) Loss of software
  • (D) Loss of printouts
Check Answer
  • (B) Loss of data

The secret word or number used for protection is called:

  • (A) Bio-metric data
  • (B) Backup
  • (C) Password
  • (D) Private word
Check Answer
  • (C) Password

Security protection for personal computers includes:

  • (A) Internal components
  • (B) Software
  • (C) Locks and cables
  • (D) All of these
Check Answer
  • (D) All of these

You cannot copy content of this page

Scroll to Top