Q.1 What is the most common tool used to restrict access to a computer system?
- User logins
- Passwords
- Computer keys
- Access-control software
Q.2 ……………..is the measurement of things such as fingerprints and retinal scans used for security access.
- Biometrics
- Bio measurement
- Computer security
- Smart weapon machinery
Q.3 A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
- Time-related bomb sequence
- Virus
- Time bomb
- Trojan horse
Q.4 What is the name of an application program that gathers user information and sends it to someone through the Internet?
- A virus
- Spybot
- Logic bomb
- Security patch
Q.5 When a logic bomb is activated by a time-related event, it is known as a:
- Time-related bomb sequence
- Virus
- Time bomb
- Trojan horse
Q.6 The thing that eventually terminates a worm virus is a lack of:
- Memory or disk space
- Time
- CD drives space
- CD-RW
Q.7 What type of virus uses computer hosts to reproduce itself?
- Time bomb
- Worm
- Melissa virus
- Macro virus
Q.8 In 1999, the Melissa virus was a widely publicised:
- E-mail virus
- Macro virus
- Trojan horse
- Time bomb
Q.9 An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
- Trojan horse
- Virus
- Time bomb
- Time-related bomb sequence.
Q.10 A program that performs a useful task while simultaneously allowing destructive acts is a:
- Worm
- Trojan horse
- Virus
- Macro virus