1. The phrase ____ describes viruses, worms, trojan horse attack applets and attack scripts ?

malware

spam

phishing

virus

Answer: malware

Explanation:

Malware describes viruses, worms, trojan horse attack applets, and attack scripts.


2. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage ?

data

cyber

Internet

metaphysical

Answer: cyber

Explanation:

Cyber security is concerned with protecting computer hardware from human tampering


3. What is the most common way to get a virus in your computer’s hard disk ?

By installing games from their CDROMS

By uploading pictures from mobile phones to the computer

By opening emails

By sending emails

Answer: By opening emails

Explanation:

The most common way to get a virus in your computer's hard disk is by opening infected email attachments or downloading and installing software or files from untrusted or malicious websites. Therefore, the correct answer is (c) By opening emails. It is important to always be cautious when opening emails, especially if they are from unknown senders or contain suspicious attachments.


4. Firewalls are used to protect against _________ ?

Unauthorised Attacks

Virus Attacks

Data Driven Attacks

Fire Attacks

Answer: Unauthorised Attacks

Explanation:

Firewalls are used to protect against Unauthorised Attacks


5. __________ are attempts by individuals to obtain confidential information from you by falsifying their identity ?

Phishing trips

Computer viruses

Special function cards

Scanners

Answer: Phishing trips

Explanation:

Phishing trips are attempts by individuals to obtain confidential information from you by falsifying their identity.


6. __________ are often delivered to a PC through an email attachment and are often designed to do harm ?

Viruses

Spam

Portals

Email messages

Answer: Viruses

Explanation:

Viruses are often delivered to a PC through an email attachment and are often designed to do harm.


7. The main reason to encrypt a file is to ?

reduce its size

secure it for transmission

prepare it for backup

include it in the start-up sequence

Answer: secure it for transmission

Explanation:

The main reason to encrypt a file is (b) to secure it for transmission. Encryption is a process of encoding information or data in such a way that only authorized parties can access it. Encrypting a file makes it difficult for unauthorized parties to read the contents of the file even if they manage to intercept it during transmission or gain access to it later. Encryption does not reduce the size of a file, prepare it for backup, or include it in the start-up sequence.


8. First boot sector virus is ?

computed

mind

brain

Elk Cloner

Answer: brain

Explanation:

The first boot sector virus is "Brain".


9. Like a virus, it is a self-replicating program. It also propagates through computer network ?

Spyware

Worm

Cracker

phishing scam

Answer: Worm

Explanation:

The correct answer is (b) Worm.


10. An anti-virus is a ?

program code

computer

company name

application software

Answer: application software

Explanation:

An anti-virus is a type of application software that is designed to detect, prevent, and remove malicious software, such as viruses, worms, Trojans, adware, and spyware from a computer system. It works by scanning files and programs for known patterns of malicious code, and then quarantining or removing any infected files.