Exercise : Computer Security Cyber crime Laws MCQ Questions and Answers
Question 1
A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
A. |
B. |
C. |
D. |
Correct Answer : C. Parasitic Virus
Description :
No answer description available for this question. Let us discuss.
Question 2
What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?
A. |
B. |
C. |
D. |
Correct Answer : B. Phishing scams
Description :
No answer description available for this question. Let us discuss.
Question 3
The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is th
A. |
B. |
C. |
D. |
Correct Answer : C. Worm
Description :
No answer description available for this question. Let us discuss.
Question 4
Which of the following is known as Malicious software?
A. |
B. |
C. |
D. |
Correct Answer : D. malware
Description :
No answer description available for this question. Let us discuss.
Question 5
A worm is...
A. |
B. |
C. |
D. |
Correct Answer : A. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
Description :
No answer description available for this question. Let us discuss.
Question 6
Code red is a(n) ----------
A. |
B. |
C. |
D. |
Correct Answer : A. Virus
Description :
No answer description available for this question. Let us discuss.
Question 7
When does the time bomb occur?
A. |
B. |
C. |
D. |
Correct Answer : D. During a particular data or time
Description :
No answer description available for this question. Let us discuss.
Question 8
Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
A. |
B. |
C. |
D. |
Correct Answer : D. ii, i, iv and iii
Description :
No answer description available for this question. Let us discuss.
Question 9
You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
A. |
B. |
C. |
D. |
Correct Answer : B. No
Description :
No answer description available for this question. Let us discuss.
Question 10
A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks
A. |
B. |
C. |
D. |
Correct Answer : D. Zombie
Description :
No answer description available for this question. Let us discuss.