Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Last Answer : d. None
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : Free adware/spyware/virus software for windows?
Last Answer : answer:ad-aware is good. spybot search & destroy too… A-squared has a free version. If you are computer savvy than I recommend HijackThis —— All of these can also be found at Major Geeks
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : Which is the best anti-adware spyware malware program? Going nuts.
Last Answer : answer:When you have something really nasty on your computer, I use Spybot Search and Destroy, it is freeware but works really well. The only drawback is scans take a really long time. ... and replaced it with this. http://www.microsoft.com/nz/digitallife/security/microsoft-security-essentials.mspx#
Description : PC help! Anti-adware/spyware solutions.
Last Answer : You need a spyware remover that doesn’t suck. Get Spybot Search and Destroy as well as Ad-Aware, both are free and you can find the links through Google.
Description : Adware is some times called ________ A. Shareware B. Abandonware C. Donationware D. Spyware
Last Answer : D. Spyware
Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These
Last Answer : a) Trojan Horses
Description : Key loggers are form of A. Spyware B. Shoulder surfing C. Trojan D. Social engineering
Last Answer : A. Spyware
Description : What’s the difference between a virus, a worm, a Trojan and spyware?
Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.
Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse
Last Answer : Polymorphic virus
Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above
Last Answer : c. People outside the organization can't access it
Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above
Last Answer : d. All of the above
Description : Which of the following can be used to help identify people in a crowd? a. Biochip b. Implant chip c. Facial recognition software d. Vision chip
Last Answer : c. Facial recognition software
Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy
Last Answer : b. Pirated software
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : An analogy similar to Trojan Horse that describes letting in an attractive enemy?
Last Answer : wolf in sheep’s clothing ? or is that about as subtle as trojan horse ?
Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology
Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.
Description : What is Trojan Horse ?
Last Answer : Trojan horses are a type of malware. Which, like a computer virus, enters and harms the computer in the guise of good software.
Description : I know it's a pighouse that gets into the PC, but why is it a Trojan and why a horse?
Last Answer : Hmmm ... Read the Iliad - and it will be clear to you ...: o Today, people read very little ...: D
Description : What city was the Trojan horse left?
Last Answer : Need answer
Description : Never Accept a Trojan Horse?
Last Answer : The original Trojan horse was sent as a gift and when opened,revealed hundreds of armed soldiers who wreaked havoc. Today'sTrojan horses are computer malware that appear to be usefulsoftware, ... a virus.Viruses, by their very definition, replicate themselves and attachto legitimate files and progr
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Last Answer : c) Firewall
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : c) Logic Bomb
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : a) Trap doors
Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above
Last Answer : d) All of the above
Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Last Answer : b. Worm
Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus
Last Answer : d. I LOVE YOU Virus
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above
Last Answer : e) All of the Above