Computer Security Questions

Q.21 ……. are attempts by individuals to obtain confidential information from you by falsifying their identity ?
A Phishing trips
B Computer viruses 
C Spyware scams
D Phishing scams 
Ans:- (A) Phishing trips
Q.22 All of the following are examples of real security and privacy risks except ?
A Hackers
B Spam
C Viruses
D Identify theft 
Ans:- (B) Spam
Q.23 Junk E-mail is also called ?
A Spam
B Spoof
C Sniffer script
D Spool 
Ans:- (A) Spam
Q.24 A digital signature is an ?
A Scanned signature
B Signature in binary form
C Encrypting information
D None of these 
Ans:- (C) Encrypting information
Q.25 To protect yourself from computer hacker intrusions, you should install a ?
A Firewall
B Mailer
C Macro
D Script 
Ans:- (A) Firewall
Q.26 Which one of the following is a key function of firewall ?
A Monitoring 
B Deleting
C Copying
D Moving 
Ans:- (A) Monitoring 
Q.27 Mechanism to protect network from outside attack is ?
A Firewall
B Antivirus
C Digital signature
D Formatting 
Ans:- (A) Firewall
Q.28 Vendor created program modifications are called  ?
A Patches
B Antiviruses
C Hales
D Fixes 
Ans:- (A) Patches
Q.29 Which of the computer memory, but unlike a virus, it does not replicate itself ?
A Trojan horse
B Logic bomb
C Cracker
D Firewall 
Ans:- (B) Logic bomb
Q.30 illegal copying and distribution of software is ?
A Hacking
B Software piracy
C Software literacy
D Cracking 
Ans:- (B) Software piracy

 

Leave a Comment

Your email address will not be published. Required fields are marked *