Uploaded by ramgsundar

quiz 1

advertisement
1. An attack to the network or the computer system by some person with authorized system
access is known as ____________ attack.
a)Insider
b)External
c)Both a) and b)
d)Semi structured
2. Three of the primary concepts in information security are confidentiality, integrity, and
__________.
a) Authentication
b) Availability
c) Encryption
d) Decryption
3. In internet terminology IP means _________________.
a) Internet Provider
b) Internet Processor
c) Internet Protocol
d) Internet Procedure
4. What is an antivirus?
a) A bigger and more dangerous virus
b) Software used to duplicate viruses
c) Computer software used to prevent, detect and remove malicious software
d) A biological agent that reproduces itself inside the cells of living things
5. __________monitors user activity on internet and transmit that information in the
background to someone else
a) Malware
b) Spyware
c) Adware
d) None of the above
Which of the following is not an external threat to a computer or
computer network
A.Ignorance
B.Trojan horses
C.Adware
D.Crackers
ANSWER: A
When a person is harrassed repeatedly by being followed then he or she
is targeted of
A.Bullying
B.Stalking
C.Identity theft
D.Phishing
ANSWER: B
Which of the following is a class of computer threat
A.Phishing
B.Soliciting
C.DoS attacks
D.Stalking
ANSWER: C
Name the program or hardware device that filters the information coming
through an internet connection to a network
A.Antivirus
B.Cookies
C.Firewall
D.Cybersafety
ANSWER: C
It allows a visited website to store its information about a user on
the users computer
A.Spam
B.Cookies
C.Malware
D.Adware
ANSWER: B
Name the method of stealing ideas or creation of others
A.Plagiarism
B.IPR
C.Piracy
D.All the above
ANSWER: D
Exploring appropriate and ethical behavious related to online
environments and digital media
A.Cyber ethics
B.Cyber security
C.Cyber safety
D.Cyber law
ANSWER: A
Identify the virus that use the techniques of writing virus code within
empty or unused space within the file
A.Cavity viruses
B.nonresident viruses
C.Resident viruses
D. Trojan
ANSWER: A
Download