Computer Security

A program that interferes with the normal routine of the computers is called:

  • (A) Virus
  • (B) Antivirus
  • (C) Freeware
  • (D) Shareware
Check Answer
  • (A) Virus

A special program that can detect and remove viruses from computer is called:

  • (A) Anti-Virus
  • (B) Virus
  • (C) Group ware
  • (D) Custom
Check Answer
  • (A) Anti-Virus

Which of the following is an example of an antivirus program?

  • (A) McAfee
  • (B) Norton
  • (C) Dr. Solomon toolkit
  • (D) All of these
Check Answer
  • (D) All of these

How does a virus reach from one computer to another?

  • (A) Data is exchanged between computers
  • (B) Exchange of display screen
  • (C) Exchange of key board
  • (D) Exchange of printer
Check Answer
  • (A) Data is exchanged between computers

Which of the following is a computer virus?

  • (A) Chernobal
  • (B) Logic Bomb
  • (C) Redlof
  • (D) All of these
Check Answer
  • (D) All of these

What is a malicious program called that is activated when a specific set of conditions are met?

  • (A) Trojan horse
  • (B) Worm
  • (C) Virus
  • (D) Logic bomb
Check Answer
  • (D) Logic bomb

Making illegal copies of copyrighted software is called:

  • (A) Software piracy
  • (B) Browsing
  • (C) Collaboration
  • (D) Electronic distribution
Check Answer
  • (A) Software piracy

Software that is available free for a limited period is called:

  • (A) Freeware
  • (B) Shareware
  • (C) Groupware
  • (D) Vertical
Check Answer
  • (B) Shareware

What of the following is used in denial of service attacks?

  • (A) Worm
  • (B) Zombie
  • (C) Virus
  • (D) Virus
Check Answer
  • (B) Zombie

Which of the following is the correct order for the phases of virus execution process?

  • 1) Propagation phase
  • ii) Dormant phase
  • iii) Execution phase
  • iv) Triggering phase
  • (A) ii, iii, and iv
  • (B) i, ii and iv
  • (C) ii, i, iv, iii
  • (D) None of the above
Check Answer
  • (C) ii, i, iv, iii

You cannot copy content of this page

Scroll to Top