What are the type of threats on the computer system or network?
- (i) Interruption
- (ii) Interception
- (iii) Modification
- (iv) Creation
- (v) Fabrication
- (A) ii, iii and iv
- (B) ii, iii and v only
- (C) i, ii, iii and v only
- (D) All of the above
- (C) i, ii, iii and v only
An independent malicious program that need not any host program to launch:
- (A) Trap virus
- (B) Trojan horse
- (C) Worm
- (D) Small virus
- (C) Worm
What of the following is a code that is triggered by being run from a certain user ID of by different series of events?
- (A) Trap door
- (B) Trojan horse
- (C) Worm
- (D) Virus
- (A) Trap door
When certain conditions are met ________ Code embedded in some genuine program that is set to “explode”.
- (A) Trap virus
- (B) Trojan horse
- (C) Worm
- (D) Logic bomb
- (D) Logic bomb
A malicious program that does not replicate automatically:
- (A) Trojan Horse
- (B) Virus
- (C) Worm
- (D) Trap virus
- (A) Trojan Horse
Which of the following program can be used to accomplish functions indirectly that an illegal user could not achieve openly?
- (A) Zombie
- (B) Virus
- (C) Trojan Horses
- (D) Logic Bomb virus
- (C) Trojan Horses
The following statements are true or false:
- i) A worm mails creates a copy of itself to other system.
- ii) A worm executes a copy of itself on other system.
- (A) True, False
- (B) False, True
- (C) True, True
- (D) False, False
- (C) True, True
Which of the following is a program that can infect other programs by modifying them?
- (A) Worm
- (B) Virus
- (C) Zombie
- (D) Trojan horses
- (B) Virus