1.Firewalls are used to protect against
(a) Unauthorised Attacks (b) Virus Attacks (c) Data Driven Attacks (d) Fire Attacks (e) None of these
Ans.a
2.A program designed to destroy data on your computer which can travel to “infect” other computers is called a
(a) disease (b) torpedo (c) hurricane (d) virus (e) mouse
Ans.d
3.What is the most common way to get a virus in your computer’s hard disk?
(a) By installing games from their CDROMS (b) By uploading pictures from mobile phones to the computer (c) By opening emails (d) By sending emails (e) None of these
Ans.c
4.Hackers
(a) all have the same motive (b) is another name for users (c) may legally break into computers as long as they do not do any damage (d) are people who are allergic to computers (e) break into other people’s computers
Ans.e
5.A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
(a) spammer (b) hacker (c) instant messenger (d) All of these (e) None of these
Ans.b
6———————-are attempts by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing scams (b) Computer viruses (c) Special function cards (d) Scanners (e) Keyboards
Ans.a
7.There are several primary categories of procedures. Which of the following is not a primary category of procedures?
(a) Testing (b) Backup and recovery (c) Firewall development (d) Design (e) None of these
Ans.c
8.Physical security is concerned with protecting computer hardware from human tampering and natural disasters and security is concerned with protecting software from unauthorised tampering or damage.
(a) data (b) cyber (c) Internet (d) metaphysical (e) publicity
Ans.a
9.Unauthorised copying of software to be used for personal gain instead of personal backups is called
(a) program thievery (b) data snatching (c) Software piracy (d) program looting (e) data looting
Ans.c
10.Which of the following are the solutions to network security?
(i) Encryption (ii) Authentication (iii) Authorization (iv) Non-repudiation (a) i, ii and iii only (b) ii, iii and iv only (c) i, iii and iv only (d) i, iii only (e) All i, ii, iii and iv
Ans.e
11.——————–are often delivered to a PC through an email attachment and are often designed to do harm.
(a) Viruses (b) Spam (c) Portals (d) Email messages (e) None of these
Ans.a
12.Which one of the following would be considered as a way that a computer virus can enter a computer system?
(a) Opening an application previously installed on the computer (b) Borrowed an illegal copy of software (c) Viewing a website without causing any.additional transactions (d) Running antivirus programs (e) None of these
Ans.b
13.A_ _ is anything that can cause harm.
(a) vulnerability (b) phishing (c) threat (d) spoof (e) None of these
Ans.c
14.A __is a small program embeded inside of a GIF image.
(a) web bug (b) cookie (c) spyware applications (d) spam (e) None of these above
Ans.a
15.A hacker contacts your phone or E-mails and attempts to acquire your password is called
(a) spoofing (b) phishing (c) spamming (d) buging (e) Noen of these
Ans.b
16.The phrase__describes viruses, worms, trojan horse attack applets and attack scripts.
(a) malware (b) spam (c) phishing (d) virus (e) None of these
Ans.a
17.Hackers often gain entry to a network be pretending to be at a legitimate computer
(a) spoofing (b) forging (c) IP spoofing (d) None of these
Ans.c
18.The main reason to encrypt a file is to
(a) reduce its size (b) secure it for transmission (c) prepare it for backup (d) include it in the start-up sequence (e) None of the above
Ans.b
19.Which one of the following is a cryptographic protocol used to secure http connection ?
(a) Stream Control Transmission Protocol (SCTP) (b) Transport Layer Security (TLS) (c) Explicit Congestion Notification (FCN) (d) Resource Reservation Protocol (RRP) (e) None of the above
Ans.b
20.is a form of virus explicitly designed to hide itself from detection by anti-virus software.
(a) Stealth Polymorphic virus (c) Parasitic virus (d) Macro virus (e) None of these
Ans.a
21.The first PC virus was developed in
(a) 1980 (b) 1984 (c) 1986 (d) 1988 (e) 1987 |
Ans.c
22.Abuse messaging systems to send unsolicited is
(a) phishing (b) spam (c) malware (d) firewall (e) adware
Ans.b
23———-are often delivered to PC through am E-mail attachment and are often designed to do harm.
(a) Viruses (b) Spam (c) Portals (d) Email messages (e) None of these
Ans.a
24.Which one of the following is a key function of firewall?
(a) Monitoring (b) Deleting (c) Copying (d) Moving (e) None of these
Ans.a
25.The first computer virus is
(a) creeper (b) PARAM (c) the famous (d) HARLIE (e) Brain
Ans.e
26.A time bomb occurs during a particular
(a) data or time (b) logic and data (c) only time (c) All of the above (e) None of these
Ans.c
27.First boot sector virus is
(a) computed (b) mind (c) brian (d) Elk Cloner (e) None of these
Ans.c
28.Which virus spreads in application software?
(a) Macro virus (b) Boot virus (C) File virus (d) Anti-virus (e) None of the above
Ans.a
29.Some viruses have delayed payload, which is sometimes called a
(a) time (b) anti-virus (c) bomb (d) All of these (e) None of these
Ans.c
30.An anti-virus is a
(a) program code (b) computer (C) company name (d) application software (e) None of these
Ans.d
31.‘Trend Micro’ is a
(a) virus program (b) anti-virus software (c) just a program (d) All of these
(e) None of the above
Ans.b
32.It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
(a) Keylogger (b) Worm (c) Virus (d) Cracker (e) None of the above
Ans.c
33.Like a virus, it is a self-replicating program. It
(a) Spyware (b) Worm Cracker (c) Cracker (d) phishing scam (e) None of these
Ans.b
34.Passwords enables user to
(a) get into the system quickly (b) make efficient use of time (c) retain confidentiality of files (d) simplify file structure (e) None of thee above
Ans.c
35.A program designed to destroy data on your compute which can travel to infect other computers, is called is
(a) disease (b) tarpedo (c) hurricane (d) virus (e) None of these
Ans.d
Get more important gk topic
in your mailbox
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.