MCQs

Filter MCQs

Search

Categories

Subcategories

Difficulty

Clear

Available Questions

Showing 991 - 1000 of 1111 Questions

is the measurement of things such as fingerprints and retinal scans used for security access.

A Biometrics
B Bio measurement
C Computer security
D Smart weapon machinery
Correct Answer

Option A: Biometrics


Discussion

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A A virus
B Spybot
C Logic bomb
D Security patch
Correct Answer

Option B: Spybot


Discussion

When a logic bomb is activated by a time-related event, it is known as a

A Time-related bomb sequence
B Virus
C Time bomb
D Trojan horse
Correct Answer

Option C: Time bomb


Discussion

The thing that eventually terminates a worm virus is a lack of:

A Memory or disk space
B Time
C CD drive space
D CD-RW
Correct Answer

Option A: Memory or disk space


Discussion

What type of virus uses computer hosts to reproduce Itself?

A Time bomb
B Worm
C Melissa virus
D Macro virus
Correct Answer

Option B: Worm


Discussion

In 1999, the Melissa virus was a widely publicised:

A E-mail virus
B Macro virus
C Trojan horse
D Time bomb
Correct Answer

Option A: E-mail virus


Discussion

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a

A Trojan horse
B Virus
C Time bomb
D Time-related bomb sequence
Correct Answer

Option B: Virus


Discussion

Malicious software is known as

A Badware
B Malware
C Maliciousware
D Illegalware
Correct Answer

Option B: Malware


Discussion

Collecting personal information and effectively posing as another individual is known as the crime of

A Spooling
B Identity theft
C Spoofing
D Hacking
Correct Answer

Option B: Identity theft


Discussion

The common name for the crime of stealing passwords is

A Jacking
B Identity theft
C Spoofing
D Hacking
Correct Answer

Option C: Spoofing


Discussion



WhatsApp Support