Close
Exercise : Computer Security Cyber crime Laws MCQ Questions and Answers

Question 1

A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.

A.  
B.  
C.  
D.  

Correct Answer : C. Parasitic Virus

Description :
No answer description available for this question. Let us discuss.

Question 2

What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

A.  
B.  
C.  
D.  

Correct Answer : B. Phishing scams

Description :
No answer description available for this question. Let us discuss.

Question 3

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is th

A.  
B.  
C.  
D.  

Correct Answer : C. Worm

Description :
No answer description available for this question. Let us discuss.

Question 4

Which of the following is known as Malicious software?

A.  
B.  
C.  
D.  

Correct Answer : D. malware

Description :
No answer description available for this question. Let us discuss.

Question 5

A worm is...

A.  
B.  
C.  
D.  

Correct Answer : A. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.

Description :
No answer description available for this question. Let us discuss.

Question 6

Code red is a(n) ----------

A.  
B.  
C.  
D.  

Correct Answer : A. Virus

Description :
No answer description available for this question. Let us discuss.

Question 7

When does the time bomb occur?

A.  
B.  
C.  
D.  

Correct Answer : D. During a particular data or time

Description :
No answer description available for this question. Let us discuss.

Question 8

Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase

A.  
B.  
C.  
D.  

Correct Answer : D. ii, i, iv and iii

Description :
No answer description available for this question. Let us discuss.

Question 9

You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?

A.  
B.  
C.  
D.  

Correct Answer : B. No

Description :
No answer description available for this question. Let us discuss.

Question 10

A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks

A.  
B.  
C.  
D.  

Correct Answer : D. Zombie

Description :
No answer description available for this question. Let us discuss.

Search Current Affairs by date
Other Category List

Cookies Consent

We use cookies to enhance your browsing experience and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookies Policy