| Q.11 | A program designed to destroy data on your computer which can travel to infect other computers is called ? |
| A | Disease |
| B | Torpedo |
| C | Hurricane |
| D | Virus |
| Q.12 | If your computer rebooting itself then it is likely that ? |
| A | It has a virus |
| B | It does not have enough memory |
| C | There is no printer |
| D | There has been a power surge |
| Q.13 | Computer virus is ? |
| A | A hardware |
| B | Window tool |
| C | A computer program |
| D | A system software |
| Q.14 | The first PC virus was developed in ? |
| A | 1980 |
| B | 1984 |
| C | 1986 |
| D | 1988 |
| Q.15 | The ….. of a threat measures its potential impact on a system ? |
| A | Vulnerabilities |
| B | Counter measures |
| C | Degree of harm |
| D | Susceptibility |
| Q.16 | A computer virus normally attaches itself to another computer program known as ? |
| A | Host program |
| B | Target program |
| C | Backdoor program |
| D | Trojan horse |
| Q.17 | Attempt to gain unauthorized access to a user system or information by pretending to be the user ? |
| A | Spoofing |
| B | Hacker |
| C | Cracker |
| D | Phishing |
| Q.18 | Which of the following enables to determine how often a user visited a website ? |
| A | Hacker |
| B | Spammer |
| C | Phish |
| D | Identify theft |
| Q.19 | A person who uses his expertise for software ? |
| A | Spammer |
| B | Hacker |
| C | Instant messenger |
| D | None of these |
| Q.20 | What is a person called who uses a computer to cause harm to people or destroy critical systems ? |
| A | Cyber terrorist |
| B | Black hat hacker |
| C | Cyber cracker |
| D | Hacktivist |
