Important question about internet previous year asked questions and answers.
1………… Is a branch of information technology known as information security.
-
Computer security
-
It security
-
Cyber security.
-
All of the above
2. Computer virus is a
- Boot up
- Magnetic tapes
- Virus.
- Application software.
3. The first PC virus was developed in
-
-
- 1980
- 1986
- 1984
- 1990
-
4. Which was the first PC boost sector virus
- Brain
- Bomb
- Payload
- Creeper
5. the first computer viruses is
- Param
- Harlie
- The famous
- Creeper
6. A computer virus normally attaches itself to another computer program is known as
- Back door program
- Target program
- Trojan horse
- Host program
7. a……. easier small program embedded inside of a GIF image
- COOKIE
- Spyware application
- Web bug
- Spam
8. the…. Threat measures its potential impact on a system.
- Degree of harm
- Counter measures
- None of these
- susceptibility
9. It takes advantages of basic hardware and software security characteristics.
System design.
10. Verification of a login name and password is known as.
Authentication.
11. If you are allowing a person on the network based on the credentials to maintain the security of your network then this act refers to the process of.
Authentication.
12. The scrambling of a code is known as
Encryption.
13. The main reason to encrypt a file is to
Secure it for transmission.
14. Crackers software or another source of
Virus attack.
15. Software such as viruses worms and Trojan horses that have a malicious content is known as.
Malicious software or malware.
16. Warm is a program that infection computer and spreads by inserting copies of itself into other executable code or documents.
Self replicating.
17. These are program designer as to seem to doing one thing , but actually being or doing another.
Trojan horses.
18. A……. Is a small program embedded inside of a gif image.
Spyware application.
19. Hackers often gain entry to a network be pretending to be at a legitimate computer.
IP spoofing.
20. Attempt to gain .unauthorised access to a uses system or information by pretending.
Spoofing.
21. Which of the following enables to a determine how after user visited a website ?
Hacker.
22. A person who uses his or her expertise to gain access to other people computers to get information illegal to damage is a.
Hacker.