Users Also Read
Read MCQ's/Objective questions
MCQ's Search Engine
Important Question
ASP.NET
Basic Computer Knowledge
Basic of Linux/Unix
C Language
C# Programming
C++ Programming
Computer Graphics
Computer Hardware
Computer Networking
Data Structures & Algorithms
Database Management System
Digital Computer Electronics
HTML
Important File Extensions
Imp. Shortcut Keys used in Computer
Internet, Web & Email
Java - Concepts and Its Programming
Language Processors
Management Information System (MIS)
MS Access
MS Excel
MS Word
Operating System
Oracle, SQL & PL/SQL
PHP Basic
Power Point
Programming Languages
Software Engineering
System Analysis and Design (SAD)
System software & compiler design
Tally
VB.NET
Visual Basic
Home⇒ Computer Engineering⇒ Computer security cyber crime and laws
1-Dont try to cram or spend more time here just read it fast and cover syllabus then practice MCQ's cheptor of same topic to check your progress. . |
2-Wrong options are also given but dont concentrate there, Right answer is in bold format. |
Q21 ⇒ Key logger is a Spyware [other wrong options] [Discuss in forum] Antivirus Firmware All of the above |
Q22 ⇒ A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. mutation engine [other wrong options] [Discuss in forum] polymorphic engine multiple engine mutual engine |
Q23 ⇒ Why might someone break into (hack) your computer? All of the above [other wrong options] [Discuss in forum] They don't like you To commit a crime To use it to distribute porn, malcious programs, etc. |
Q24 ⇒ The virus that spread in application software is called as Macro virus [other wrong options] [Discuss in forum] Boot virus Anti virus File virus |
Q25 ⇒ What is the first boot sector virus? Brain [other wrong options] [Discuss in forum] Mind ELK cloner None of the above. |
Q26 ⇒ Authentication is hard to assure identity of user on a remote system [other wrong options] [Discuss in forum] insertion modification none of the above |
Q27 ⇒ …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. Stealth virus [other wrong options] [Discuss in forum] Macro Virus Parasitic Virus Polymorphic Virus |
Q28 ⇒ A worm is... Pieces of malicious code that make copies of themselves and spread through computers without human interaction. [other wrong options] [Discuss in forum] A slimy pink thing that lives in dirt An unsolicited email message. None |
Q29 ⇒ What is “Trend Micro”? It is anti-virus software [other wrong options] [Discuss in forum] It is virus program It is just a program None of the above |
Q30 ⇒ When does the time bomb occur? During a particular data or time [other wrong options] [Discuss in forum] During a particular time During a particular logic and data None of the above |
Q31 ⇒ Which of the following is/are threats for electronic payment systems? All of the above [other wrong options] [Discuss in forum] Computer virus Computer worms Trojan horse |
Q32 ⇒ Which of the following virus overtake computer system, when it boots and destroy information? Stealth virus [other wrong options] [Discuss in forum] Trojan Boot infectors System infectors |
Q33 ⇒ A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. Parasitic Virus [other wrong options] [Discuss in forum] Macro Virus Stealth virus Polymorphic Virus |
Q34 ⇒ A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. Polymorphic Virus [other wrong options] [Discuss in forum] Boot Sector Virus Macro Virus Parasitic Virus |
Q35 ⇒ All of the following are examples of real security and privacy risks EXCEPT Spam [other wrong options] [Discuss in forum] Hackers Identity theft Viruses |
Q36 ⇒ You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately? No [other wrong options] [Discuss in forum] Yes Maybe All of the above |
Q37 ⇒ Social engineering is: Scams distributed through email such as phishing, pharming and impersonation. [other wrong options] [Discuss in forum] A website created for people who share common interests. A targeted attack on a personal computer. None |
Q38 ⇒ What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? Trojan horses [other wrong options] [Discuss in forum] Worm Cracker Keylogger |
Q39 ⇒ What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity? Phishing scams [other wrong options] [Discuss in forum] Computer viruses Spyware scams None of the above |
Q40 ⇒ Delayed payload of some viruses is also called as Bomb [other wrong options] [Discuss in forum] Time Anti-virus None of the above |
Or |