Site icon Compitative Exams MCQ Questions and Answers

basic internet questions and answers


Important question about internet previous year asked questions and answers.

1………… Is a branch of information technology known as information security.

2. Computer virus is a

3. The first PC virus was developed in

4. Which was the first PC boost sector virus

5. the first computer viruses is

6. A computer virus normally attaches itself to another computer program is known as

7. a……. easier small program embedded inside of a GIF image

8. the…. Threat measures its potential impact on a system.

 

9. It takes advantages of basic hardware and software security characteristics.

System design.

 

10. Verification of a login name and password is known as.

Authentication.

 

11. If you are allowing a person on the network based on the credentials to maintain the security of your network then this act refers to the process of.

Authentication.

 

12. The scrambling of a code is known as

Encryption.

 

13. The main reason to encrypt a file is to

Secure it for transmission.

 

14. Crackers software or another source of

Virus attack.

 

15. Software such as viruses worms and Trojan horses that have a malicious content is known as.

Malicious software or malware.

 

16. Warm is a program that infection computer and spreads by inserting copies of itself into other executable code or documents.

Self replicating.

 

17. These are  program designer as to seem to doing one thing , but actually being or  doing another.

Trojan horses.

 

18. A……. Is a small program embedded inside of a gif image.

Spyware application.

 

19. Hackers often gain  entry to a network be pretending to be at a legitimate computer.

IP spoofing.

 

20. Attempt to gain .unauthorised access to a uses system or information by pretending.

Spoofing.

 

21. Which of the following enables to a determine how after user visited a website ?

Hacker.

 

22. A person who uses his or her  expertise to gain access to other people computers to get information illegal to damage is a.

Hacker.

Exit mobile version