1.Firewalls are used to protect against

(a) Unauthorised Attacks (b) Virus Attacks (c) Data Driven Attacks (d) Fire Attacks (e) None of these

Ans.a

2.A program designed to destroy data on your computer which can travel to “infect” other computers is called a

(a) disease (b) torpedo (c) hurricane (d) virus (e) mouse

Ans.d

3.What is the most common way to get a virus in your computer’s hard disk?

(a) By installing games from their CDROMS (b) By uploading pictures from mobile phones to the computer (c) By opening emails (d) By sending emails (e) None of these

Ans.c

4.Hackers

(a) all have the same motive (b) is another name for users (c) may legally break into computers as long as they do not do any damage (d) are people who are allergic to computers (e) break into other people’s computers

Ans.e

5.A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

(a) spammer (b) hacker (c) instant messenger (d) All of these (e) None of these

Ans.b

6———————-are attempts by individuals to obtain confidential information from you by falsifying their identity.

(a) Phishing scams (b) Computer viruses (c) Special function cards (d) Scanners (e) Keyboards

Ans.a

7.There are several primary categories of procedures. Which of the following is not a primary category of procedures?

(a) Testing (b) Backup and recovery (c) Firewall development (d) Design (e) None of these

Ans.c

8.Physical security is concerned with protecting computer hardware from human tampering and natural disasters and security is concerned with protecting software from unauthorised tampering or damage.

(a) data (b) cyber (c) Internet (d) metaphysical (e) publicity

Ans.a

9.Unauthorised copying of software to be used for personal gain instead of personal backups is called

(a) program thievery (b) data snatching (c) Software piracy (d) program looting (e) data looting

Ans.c

10.Which of the following are the solutions to network security?

(i) Encryption (ii) Authentication (iii) Authorization (iv) Non-repudiation (a) i, ii and iii only (b) ii, iii and iv only (c) i, iii and iv only (d) i, iii only (e) All i, ii, iii and iv

Ans.e

11.——————–are often delivered to a PC through an email attachment and are often designed to do harm.

(a) Viruses (b) Spam (c) Portals (d) Email messages (e) None of these

Ans.a

12.Which one of the following would be considered as a way that a computer virus can enter a computer system?

(a) Opening an application previously installed on the computer (b) Borrowed an illegal copy of software (c) Viewing a website without causing any.additional transactions (d) Running antivirus programs (e) None of these

Ans.b

13.A_ _ is anything that can cause harm.

(a) vulnerability (b) phishing (c) threat (d) spoof (e) None of these

Ans.c

14.A __is a small program embeded inside of a GIF image.

(a) web bug (b) cookie (c) spyware applications (d) spam (e) None of these above

Ans.a

15.A hacker contacts your phone or E-mails and attempts to acquire your password is called

(a) spoofing (b) phishing (c) spamming (d) buging (e) Noen of these

Ans.b

16.The phrase__describes viruses, worms, trojan horse attack applets and attack scripts.

(a) malware (b) spam (c) phishing (d) virus (e) None of these

Ans.a

17.Hackers often gain entry to a network be pretending to be at a legitimate computer

(a) spoofing (b) forging (c) IP spoofing (d) None of these

Ans.c

18.The main reason to encrypt a file is to

(a) reduce its size (b) secure it for transmission (c) prepare it for backup (d) include it in the start-up sequence  (e) None of the above

Ans.b

19.Which one of the following is a cryptographic protocol used to secure http connection ?

(a) Stream Control Transmission Protocol (SCTP) (b) Transport Layer Security (TLS) (c) Explicit Congestion Notification (FCN) (d) Resource Reservation Protocol (RRP) (e) None of the above

Ans.b

20.is a form of virus explicitly designed to hide itself from detection by anti-virus software.

(a) Stealth Polymorphic virus (c) Parasitic virus (d) Macro virus (e) None of these

Ans.a

21.The first PC virus was developed in

(a) 1980 (b) 1984 (c) 1986 (d) 1988 (e) 1987 |

Ans.c

22.Abuse messaging systems to send unsolicited is

(a) phishing (b) spam (c) malware (d) firewall (e) adware

Ans.b

23———-are often delivered to PC through am E-mail attachment and are often designed to do harm.

(a) Viruses (b) Spam (c) Portals (d) Email messages (e) None of these

Ans.a

24.Which one of the following is a key function of firewall?

(a) Monitoring (b) Deleting (c) Copying (d) Moving (e) None of these

Ans.a

25.The first computer virus is

(a) creeper (b) PARAM (c) the famous (d) HARLIE (e) Brain

Ans.e

26.A time bomb occurs during a particular

(a) data or time (b) logic and data (c) only time (c) All of the above (e) None of these

Ans.c

27.First boot sector virus is

(a) computed (b) mind (c) brian (d) Elk Cloner (e) None of these

Ans.c

28.Which virus spreads in application software?

(a) Macro virus (b) Boot virus (C) File virus (d) Anti-virus (e) None of the above

Ans.a

29.Some viruses have delayed payload, which is sometimes called a

(a) time (b) anti-virus (c) bomb (d) All of these (e) None of these

Ans.c

30.An anti-virus is a

(a) program code (b) computer (C) company name (d) application software (e) None of these

Ans.d

31.‘Trend Micro’ is a

(a) virus program (b) anti-virus software (c) just a program (d) All of these

(e) None of the above

Ans.b

32.It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(a) Keylogger (b) Worm (c) Virus (d) Cracker (e) None of the above

Ans.c

33.Like a virus, it is a self-replicating program. It

(a) Spyware (b) Worm Cracker (c) Cracker (d) phishing scam (e) None of these

Ans.b

34.Passwords enables user to

(a) get into the system quickly (b) make efficient use of time (c) retain confidentiality of files (d) simplify file structure (e) None of thee above

Ans.c

35.A program designed to destroy data on your compute which can travel to infect other computers, is called is

(a) disease (b) tarpedo (c) hurricane (d) virus (e) None of these

Ans.d

 

Get more important gk topic
in your mailbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Leave a Reply

Your email address will not be published. Required fields are marked *