Close
Exercise : Computer Security Cyber crime Laws MCQ Questions and Answers

1. All of the following are examples of real security and privacy risks EXCEPT

A.  
B.  
C.  
D.  

Correct Answer : A. Spam

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

2. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.

A.  
B.  
C.  
D.  

Correct Answer : D. Parasitic Virus

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

3. .-------- are attempts by individuals to obtain confidential information from you to falsifying their identity.

A.  
B.  
C.  
D.  

Correct Answer : B. Phishing scams

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

4. Which of the following is not an antivirus software?

A.  
B.  
C.  
D.  

Correct Answer : B. Code Red

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

5. A worm is...

A.  
B.  
C.  
D.  

Correct Answer : A. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

6. The virus that spread in application software is called as

A.  
B.  
C.  
D.  

Correct Answer : A. Macro virus

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

7. Which of the following is known as Malicious software?

A.  
B.  
C.  
D.  

Correct Answer : D. malware

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

8. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

A.  
B.  
C.  
D.  

Correct Answer : B. Phishing scams

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

9. What is “Trend Micro”?

A.  
B.  
C.  
D.  

Correct Answer : D. It is anti-virus software

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

10. A -------- is a computer program that can replicate itself and spread from one computer to another.

A.  
B.  
C.  
D.  

Correct Answer : B. Computer Virus

Description :
No answer description available for this question. Let us discuss.

View Answer 50/50 Workspace Report Discuss

Search Current Affairs by date
Other Category List