Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Last Answer : d. None
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : What is software you don't want hidden inside software you do want? a. Adware b. Trojan‐horse software c. Spyware d. All of the above
Last Answer : d. All of the above
Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus
Last Answer : d. I LOVE YOU Virus
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology
Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Last Answer : c) Firewall
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : c) Logic Bomb
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : a) Trap doors
Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above
Last Answer : d) All of the above
Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse
Last Answer : B) Zombie
Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie
Last Answer : A) Trojan Horse
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus
Last Answer : A) Trap doors
Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm
Last Answer : D) Worm
Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse
Last Answer : Polymorphic virus
Description : Pick the odd one out : (1) Java clients (2) Worms (3) Trojan Horse (4) Virus
Last Answer : Trojan Horse
Description : What are the most commonly used input devices today? a. Keyboard b. Mouse c. All of the above d. None of the above
Last Answer : c. All of the above
Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii
Last Answer : D) Non i and ii
Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above
Last Answer : d. None of the above
Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : d. Biometrics
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These
Last Answer : a) Trojan Horses
Description : An analogy similar to Trojan Horse that describes letting in an attractive enemy?
Last Answer : wolf in sheep’s clothing ? or is that about as subtle as trojan horse ?
Description : What is Trojan Horse ?
Last Answer : Trojan horses are a type of malware. Which, like a computer virus, enters and harms the computer in the guise of good software.
Description : I know it's a pighouse that gets into the PC, but why is it a Trojan and why a horse?
Last Answer : Hmmm ... Read the Iliad - and it will be clear to you ...: o Today, people read very little ...: D
Description : What city was the Trojan horse left?
Last Answer : Need answer
Description : Never Accept a Trojan Horse?
Last Answer : The original Trojan horse was sent as a gift and when opened,revealed hundreds of armed soldiers who wreaked havoc. Today'sTrojan horses are computer malware that appear to be usefulsoftware, ... a virus.Viruses, by their very definition, replicate themselves and attachto legitimate files and progr
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb
Last Answer : C) Logic Bomb
Description : Which of the following uses the spawn mechanism to duplicate itself ? (1) Trojan horse (2) Worm (3) Keystroke logger (4) Logic bomb
Last Answer : Worm