| Q.21 | ……. are attempts by individuals to obtain confidential information from you by falsifying their identity ? |
| A | Phishing trips |
| B | Computer viruses |
| C | Spyware scams |
| D | Phishing scams |
| Q.22 | All of the following are examples of real security and privacy risks except ? |
| A | Hackers |
| B | Spam |
| C | Viruses |
| D | Identify theft |
| Q.23 | Junk E-mail is also called ? |
| A | Spam |
| B | Spoof |
| C | Sniffer script |
| D | Spool |
| Q.24 | A digital signature is an ? |
| A | Scanned signature |
| B | Signature in binary form |
| C | Encrypting information |
| D | None of these |
| Q.25 | To protect yourself from computer hacker intrusions, you should install a ? |
| A | Firewall |
| B | Mailer |
| C | Macro |
| D | Script |
| Q.26 | Which one of the following is a key function of firewall ? |
| A | Monitoring |
| B | Deleting |
| C | Copying |
| D | Moving |
| Q.27 | Mechanism to protect network from outside attack is ? |
| A | Firewall |
| B | Antivirus |
| C | Digital signature |
| D | Formatting |
| Q.28 | Vendor created program modifications are called ? |
| A | Patches |
| B | Antiviruses |
| C | Hales |
| D | Fixes |
| Q.29 | Which of the computer memory, but unlike a virus, it does not replicate itself ? |
| A | Trojan horse |
| B | Logic bomb |
| C | Cracker |
| D | Firewall |
| Q.30 | illegal copying and distribution of software is ? |
| A | Hacking |
| B | Software piracy |
| C | Software literacy |
| D | Cracking |
