Most Repeated MCQs

Filter MCQs

Search

Categories

Subcategories

Difficulty

Clear

Available Questions

Showing 251 - 260 of 377 Questions

which refers to electronic trespassing or criminal hacking?

A Cracking
B Jacking
C Spoofing
D Smarming
Correct Answer

Option A: Cracking


Discussion

__ is defined as any crime completed through the use of computer technology?

A Computer forensic
B Computer crime
C Hacking
D Cracking
Correct Answer

Option B: Computer crime


Discussion

To prevent the loss of data during power failures, use a(n)

A Encryption program
B Surge protector
C Firewall
D UPS
Correct Answer

Option D: UPS


Discussion

The scrambling of code is known as

A Encryption
B A firewall
C Coding
D Password
Correct Answer

Option A: Encryption


Discussion

software Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

A Hacker-proof program
B Firewall
C Hacker-resistant server
D Encryption safe wall
Correct Answer

Option B: Firewall


Discussion

What is the most common tool used to restrict access to a computer system?

A User logins
B Passwords
C Computer keys
D Access-control
Correct Answer

Option B: Passwords


Discussion

is the measurement of things such as fingerprints and retinal scans used for security access.

A Biometrics
B Bio measurement
C Computer security
D Smart weapon machinery
Correct Answer

Option A: Biometrics


Discussion

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A A virus
B Spybot
C Logic bomb
D Security patch
Correct Answer

Option B: Spybot


Discussion

When a logic bomb is activated by a time-related event, it is known as a

A Time-related bomb sequence
B Virus
C Time bomb
D Trojan horse
Correct Answer

Option C: Time bomb


Discussion

The thing that eventually terminates a worm virus is a lack of:

A Memory or disk space
B Time
C CD drive space
D CD-RW
Correct Answer

Option A: Memory or disk space


Discussion



WhatsApp Support