A program that interferes with normal functioning of the computer is called:
- (a) Bacteria
- (b) Virus
- (c) Firmware
- (d) Infection
- (b) Virus
This is not a computer virus:
- (a) Norton
- (b) Rudolf
- (c) Chernobyl
- (d) All are computer virus
- (a) Norton
________ occurs when a person sends a message (or many messages) with angry or antagonistic content.
- (A) Flaming
- (B) Email Bankruptcy
- (C) Email Phishing
- (D) Email fatigue
- (A) Flaming
Protecting computers and the information they contain against unwanted access, damage, modification or destruction is called:
- (A) Computer monitoring Â
- (B) Audit control
- (C) Electronic policing.
- (D) Computer security
- (D) Computer security
Restricted access to the server computer room is a form of:
- (A) Logical security
- (B) Physical security
- (C) Enterprise security
- (D) User security
- (B) Physical security
The measurement of things such as fingerprints and retinal scans used for security access is called:
- (A) Bio-metrics
- (B) Computer security
- (C) Bio-measurement
- (D) Smart weapon machinery
- (A) Bio-metrics
This is not a bio-metric technique:
- (A) Badge
- (B) Retina
- (C) Face
- (D) Palm print
- (A) Badge
Which of the following is the most devastating loss to a company?
- (A) Loss of hardware
- (B) Loss of data
- (C) Loss of software
- (D) Loss of printouts
- (B) Loss of data
The secret word or number used for protection is called:
- (A) Bio-metric data
- (B) Backup
- (C) Password
- (D) Private word
- (C) Password
Security protection for personal computers includes:
- (A) Internal components
- (B) Software
- (C) Locks and cables
- (D) All of these
- (D) All of these