Q.11 | A program designed to destroy data on your computer which can travel to infect other computers is called ? |
A | Disease |
B | Torpedo |
C | Hurricane |
D | Virus |
Q.12 | If your computer rebooting itself then it is likely that ? |
A | It has a virus |
B | It does not have enough memory |
C | There is no printer |
D | There has been a power surge |
Q.13 | Computer virus is ? |
A | A hardware |
B | Window tool |
C | A computer program |
D | A system software |
Q.14 | The first PC virus was developed in ? |
A | 1980 |
B | 1984 |
C | 1986 |
D | 1988 |
Q.15 | The ….. of a threat measures its potential impact on a system ? |
A | Vulnerabilities |
B | Counter measures |
C | Degree of harm |
D | Susceptibility |
Q.16 | A computer virus normally attaches itself to another computer program known as ? |
A | Host program |
B | Target program |
C | Backdoor program |
D | Trojan horse |
Q.17 | Attempt to gain unauthorized access to a user system or information by pretending to be the user ? |
A | Spoofing |
B | Hacker |
C | Cracker |
D | Phishing |
Q.18 | Which of the following enables to determine how often a user visited a website ? |
A | Hacker |
B | Spammer |
C | Phish |
D | Identify theft |
Q.19 | A person who uses his expertise for software ? |
A | Spammer |
B | Hacker |
C | Instant messenger |
D | None of these |
Q.20 | What is a person called who uses a computer to cause harm to people or destroy critical systems ? |
A | Cyber terrorist |
B | Black hat hacker |
C | Cyber cracker |
D | Hacktivist |