Users Also Read
Read MCQ's/Objective questions
MCQ's Search Engine
Important Question
ASP.NET
Basic Computer Knowledge
Basic of Linux/Unix
C Language
C# Programming
C++ Programming
Computer Graphics
Computer Hardware
Computer Networking
Data Structures & Algorithms
Database Management System
Digital Computer Electronics
HTML
Important File Extensions
Imp. Shortcut Keys used in Computer
Internet, Web & Email
Java - Concepts and Its Programming
Language Processors
Management Information System (MIS)
MS Access
MS Excel
MS Word
Operating System
Oracle, SQL & PL/SQL
PHP Basic
Power Point
Programming Languages
Software Engineering
System Analysis and Design (SAD)
System software & compiler design
Tally
VB.NET
Visual Basic
Home⇒ Computer Engineering⇒ Computer security cyber crime and laws
1-Dont try to cram or spend more time here just read it fast and cover syllabus then practice MCQ's cheptor of same topic to check your progress. . |
2-Wrong options are also given but dont concentrate there, Right answer is in bold format. |
Q1 ⇒ Which of the following is not an antivirus software? Code Red [other wrong options] [Discuss in forum] ![]() ![]() AVG Avast MCAfee |
Q2 ⇒ Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase ii, i, iv and iii [other wrong options] [Discuss in forum] ![]() ![]() i, ii, iii, and iv ii, iii, iv and i i, iii, ii and iv |
Q3 ⇒ MCAfee is an example of Antivirus [other wrong options] [Discuss in forum] ![]() ![]() Virus Quick Heal Photo Editing Software |
Q4 ⇒ What is the name of the Act that governs internet usage in India? The Information Technology Act, 2004 [other wrong options] [Discuss in forum] ![]() ![]() The Internet consumption Act, 1998 The IT Gazette of India Act, 2004 None of these |
Q5 ⇒ To protect yourself from computer hacker, you should turn on a Firewall [other wrong options] [Discuss in forum] ![]() ![]() Script Antivirus VLC |
Q6 ⇒ A strong password should contain: At least 8 characters, and a combination of letters, numbers, and characters. [other wrong options] [Discuss in forum] ![]() ![]() Both uppercase and lowercase letters. A word that is easy to remember, such as the name of a pet. None |
Q7 ⇒ State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. Both i and ii [other wrong options] [Discuss in forum] ![]() ![]() i-only ii-only Non i and ii |
Q8 ⇒ What is the virus that spread in computer? It is a computer program [other wrong options] [Discuss in forum] ![]() ![]() It is system software It is a windows tool It is hardware |
Q9 ⇒ If you receive an email claiming to need your username and/or password, what should you do? Report it as phishing/spam through your email provider [other wrong options] [Discuss in forum] ![]() ![]() Delete the message Reply to the message with your email and password None |
Q10 ⇒ What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)? Malware [other wrong options] [Discuss in forum] ![]() ![]() Malisoft Malairasoft Moleculewar |
Q11 ⇒ The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is th Worm [other wrong options] [Discuss in forum] ![]() ![]() Time Bomb Cracker Keylogger |
Q12 ⇒ …………….. are used in denial of service attacks, typically against targeted web sites. Zombie [other wrong options] [Discuss in forum] ![]() ![]() Trojan horse Worm Virus |
Q13 ⇒ A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks Zombie [other wrong options] [Discuss in forum] ![]() ![]() Trap doors Virus Worm |
Q14 ⇒ What is a firewall? A filter for an internet connection that monitors outgoing and incoming activity. [other wrong options] [Discuss in forum] ![]() ![]() A program that protects against viruses. A wall that is reinforced and cannot catch on fire. None |
Q15 ⇒ How does a Le-Hard virus come into existence? Command.Com [other wrong options] [Discuss in forum] ![]() ![]() Software Hardware FRIDAY 13 |
Q16 ⇒ VIRUS stands for Vital Information Resource Under Slege [other wrong options] [Discuss in forum] ![]() ![]() Very Intelligent Result Until Source Viral Important Record User Searched Very Interchanged Resource Under Search |
Q17 ⇒ Which of the following would most likely not be a symptom of a virus? The CD–ROM stops functioning [other wrong options] [Discuss in forum] ![]() ![]() Existing program files and icons disappear The web browser opens to an unusual home page Odd message or images are displayed on the screen |
Q18 ⇒ In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. Propagation phase [other wrong options] [Discuss in forum] ![]() ![]() Execution phase Dormant phase Triggering phase |
Q19 ⇒ What is the best way to protect your information when you are away from your computer? Lock the computer with a password [other wrong options] [Discuss in forum] ![]() ![]() Activate the screen saver Turn the monitor off None |
Q20 ⇒ Which of the following is known as Malicious software? malware [other wrong options] [Discuss in forum] ![]() ![]() maliciousware illegalware badware |
Or |