Q.1 ……….is the measurement of things such as fingerprints and retinal scans used for security access.
- Biometrics
- Bio measurement
- Computer security
- Smart weapon machinery
Q.2 What is the name of an application program that gathers user information and sends it to someone through the Internet?
- A virus
- Spybot
- Logic bomb
- Security patch
Q,3 A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
- Time-related bomb sequence
- Virus
- Time bomb
- Trojan horse.
Q.4 When a logic bomb is activated by a time-related event, it is known as a:
- Time-related bomb sequence
- Virus
- Time bomb
- Trojan horse.
Q.5 The thing that eventually terminates a worm virus is a lack of:
- Memory or disk space
- Time
- CD drives space
- CD-RW.
Q.6 What type of virus uses computer hosts to reproduce itself?
- Time bomb
- Worm
- Melissa virus
- Macro virus
Q.7 In 1999, the Melissa virus was a widely publicised:
- E-mail virus
- Macro virus
- Trojan horse
- Time bomb.
Q.8 An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
- Trojan horse
- Virus
- Time bomb
- Time-related bomb sequence.
Q.9 A program that performs a useful task while simultaneously allowing destructive acts is a:
- Worm
- Trojan horse
- Virus
- Macro virus.
Q.10 Malicious software is known as:
- Badware
- Malware
- Maliciousware
- Illegalware.