EASY
Earn 100

A computer virus normally attaches itself to another computer program known as a:

50% studentsanswered this correctly

Important Questions on Computer and Internet Basics

EASY
Verification of login name and password is known as:
EASY
Which of the following protects the computer from the hackers?
EASY
_____are often delivered to a PC through an email attachment and are often designed to do harm.
MEDIUM
Single-word reference to viruses, worms etc., is called:
EASY
Among the following which of these feature is not a function performed by spyware?
EASY

Major Internet companies are now encrypting all emails. For this, they usually rely on a form of encryption known as the TLS. The abbreviation TLS stands for:

EASY
All of the following are examples of real security and privacy risks except _____.
MEDIUM
The Illegal access of data via voice over internet protocol (VOIP), Visaing is IP telephony's version of phishing and uses voice messages to steal identities and resources:
MEDIUM
_____ refers to electronic trespassing or criminal hacking.
MEDIUM

Consider the following statements

1. Malware is the defective software and has contained harmful bugs.

2. Rootkits, computer viruses, worms, trojan horses and spyware are some important malwares.

3. Malware is invasive software or computer code designed to protect unknown access to computer systems.

Which of the statements given above is/are correct?

EASY
_____ are often delivered to a PC through an email attachment and are often designed to do harm.
MEDIUM
Which of the following is not an example of Phishing Fraud?
MEDIUM

Consider the following statements

1. Computer virus is a computer program that can copy itself and infect a computer.

2. A virus can spread from one computer to another through a removable medium like floppy disk, CD, DVD, or USB drive.

3. Viruses flood a network with traffic, making it possible to perform any internet activity

Which of the statements given above is/are correct?

HARD
The biggest challenges, when it comes to cyber crimes are?
MEDIUM
Nowadays Vishing has become a criminal practice of using social engineering over which of the following?
MEDIUM
Which of the following is a theory proposes “Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in cyberspace provides the offenders the choice to commit cyber crime.
EASY
_____ is the industry standard name for the first computer virus for MS-DOS.