Q.21 | ……. are attempts by individuals to obtain confidential information from you by falsifying their identity ? |
A | Phishing trips |
B | Computer viruses |
C | Spyware scams |
D | Phishing scams |
Q.22 | All of the following are examples of real security and privacy risks except ? |
A | Hackers |
B | Spam |
C | Viruses |
D | Identify theft |
Q.23 | Junk E-mail is also called ? |
A | Spam |
B | Spoof |
C | Sniffer script |
D | Spool |
Q.24 | A digital signature is an ? |
A | Scanned signature |
B | Signature in binary form |
C | Encrypting information |
D | None of these |
Q.25 | To protect yourself from computer hacker intrusions, you should install a ? |
A | Firewall |
B | Mailer |
C | Macro |
D | Script |
Q.26 | Which one of the following is a key function of firewall ? |
A | Monitoring |
B | Deleting |
C | Copying |
D | Moving |
Q.27 | Mechanism to protect network from outside attack is ? |
A | Firewall |
B | Antivirus |
C | Digital signature |
D | Formatting |
Q.28 | Vendor created program modifications are called ? |
A | Patches |
B | Antiviruses |
C | Hales |
D | Fixes |
Q.29 | Which of the computer memory, but unlike a virus, it does not replicate itself ? |
A | Trojan horse |
B | Logic bomb |
C | Cracker |
D | Firewall |
Q.30 | illegal copying and distribution of software is ? |
A | Hacking |
B | Software piracy |
C | Software literacy |
D | Cracking |