Computer Security

What are the type of threats on the computer system or network?

  • (i) Interruption
  • (ii) Interception
  • (iii) Modification
  • (iv) Creation
  • (v) Fabrication
  • (A) ii, iii and iv
  • (B) ii, iii and v only
  • (C) i, ii, iii and v only
  • (D) All of the above
Check Answer
  • (C) i, ii, iii and v only

An independent malicious program that need not any host program to launch:

  • (A) Trap virus
  • (B) Trojan horse
  • (C) Worm
  • (D) Small virus
Check Answer
  • (C) Worm

What of the following is a code that is triggered by being run from a certain user ID of by different series of events?

  • (A) Trap door
  • (B) Trojan horse
  • (C) Worm
  • (D) Virus
Check Answer
  • (A) Trap door

When certain conditions are met ________ Code embedded in some genuine program that is set to “explode”.

  • (A) Trap virus
  • (B) Trojan horse
  • (C) Worm
  • (D) Logic bomb
Check Answer
  • (D) Logic bomb

A malicious program that does not replicate automatically:

  • (A) Trojan Horse
  • (B) Virus
  • (C) Worm
  • (D) Trap virus
Check Answer
  • (A) Trojan Horse

Which of the following program can be used to accomplish functions indirectly that an illegal user could not achieve openly?

  • (A) Zombie
  • (B) Virus
  • (C) Trojan Horses
  • (D) Logic Bomb virus
Check Answer
  • (C) Trojan Horses

The following statements are true or false:

  • i) A worm mails creates a copy of itself to other system.
  • ii) A worm executes a copy of itself on other system.
  • (A) True, False
  • (B) False, True
  • (C) True, True
  • (D) False, False
Check Answer
  • (C) True, True

Which of the following is a program that can infect other programs by modifying them?

  • (A) Worm
  • (B) Virus
  • (C) Zombie
  • (D) Trojan horses
Check Answer
  • (B) Virus

« PREV.1 ... 4 5

You cannot copy content of this page

Scroll to Top