1. Some viruses have delayed payload, which is sometimes called a ?

time

anti-virus

bomb

All of these

Answer: bomb

Explanation:

The correct answer is (a) time. Some viruses have a delayed payload that is set to activate at a specific time or date. This is often done to avoid detection by antivirus software, which may not detect the virus until after the payload has been activated. The delayed payload can be used to perform a variety of malicious actions, such as deleting files, stealing data, or spreading the virus to other systems. However, this is not commonly referred to as a bomb or anti-virus.


2. Which one of the following is a key function of firewall ?

Monitoring

Deleting

Copying

Moving

Answer: Monitoring

Explanation:

Monitoring is a key function of a firewall. Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules. The purpose of a firewall is to prevent unauthorized access to or from a private network while allowing authorized communication. It achieves this by analyzing the data packets passing through it and blocking or allowing them based on the security rules in place.


3. The first PC virus was developed in ?

1980

1984

1986

1988

Answer: 1986

Explanation:

The correct answer is (c) 1986. The first PC virus was developed in 1986 and was called the Brain virus. It was created by two Pakistani brothers, Basit and Amjad Farooq Alvi, and was designed to infect IBM PC computers. The virus was spread through infected floppy disks and would display a message to the user, telling them to contact the creators to remove the virus. This virus marked the beginning of the computer virus era and led to the development of antivirus software to combat these threats.


4. ____ are often delivered to PC through an E-mail attachment and are often designed to do harm ?

Viruses

Spam

Portals

Email messages

Answer: Viruses

Explanation:

Viruses are often delivered to PCs through an email attachment and are often designed to do harm.


5. Hackers often gain entry to a network be pretending to be at a legitimate computer ?

spoofing

forging

IP spoofing

None of these

Answer: IP spoofing

Explanation:

IP spoofing specifically refers to a type of spoofing where the hacker falsifies their IP address to make it appear as if they are coming from a different location.


6. A ____ is a small program embeded inside of a GIF image ?

web bug

cookie

spyware applications

spam

Answer: web bug

Explanation:

A web bug, also known as a tracking pixel or clear GIF, is a small image, usually 1x1 pixel in size, that is embedded in a web page or an email. Web bugs are typically used by marketers or advertisers to track user behavior and collect information about the users who view their content. They can also be used by spammers or malicious actors to track user activity without their consent.


7. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______ ?

spammer

hacker

instant messenger

All of these

Answer: hacker

Explanation:

The correct answer is (b) hacker. A hacker is someone who gains unauthorized access to computer systems or networks in order to steal, modify, or destroy information, or to cause other harm. Spammers are people who send unsolicited emails or messages in bulk, and instant messengers are applications used to send real-time text messages over the internet.


8. Unauthorised copying of software to be used for personal gain instead of personal backups is called ?

program thievery

data snatching

software piracy

program looting

Answer: software piracy

Explanation:

The term used for the unauthorized copying of software to be used for personal gain instead of personal backups is (c) software piracy.


9. Which one of the following is a cryptographic protocol used to secure http connection ?

Stream Control Transmission Protocol (SCTP)

Transport Layer Security (TLS)

Explicit Congestion Notification (FCN)

Resource Reservation Protocol (RRP)

Answer: Transport Layer Security (TLS)

Explanation:

The cryptographic protocol used to secure HTTP connections is Transport Layer Security (TLS), so the answer is (b).


10. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents ?

Keylogger

Worm

Virus

Cracker

Answer: Virus

Explanation:

Virus is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents