MCQs
Total Questions : 66
| Page 3 of 7 pages
Answer: Option A. -> security exploit
Answer: Option A. -> hacker breaks security for altruistic or at least non-malicious reasons.
Answer: Option A. -> Malware
Answer: Option A. -> Unauthorized Attacks
Answer: Option A. -> Macro virus
Answer: Option C. -> retain confidentiality of files
Answer: Option C. -> Virus
Answer: (c)
The term ‘Virus’ stands for Vital Information Resources under Siege. A computer virus is a self-replicating program containing code that explicitly copies itself into other executable codes or programs.
Answer: (c)
The term ‘Virus’ stands for Vital Information Resources under Siege. A computer virus is a self-replicating program containing code that explicitly copies itself into other executable codes or programs.
Answer: Option A. -> creeper
Answer: (a)
A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application
Answer: (a)
A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application
Answer: Option C. -> brian
Answer: (c)
The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users. Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.
Answer: (c)
The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users. Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.
Answer: Option A. -> hacker
Answer: (a)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes.
Answer: (a)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes.