In a small office network, to protect every computer from hackers, virus or worm. -Technology

1 Answer

Answer :

1. True2. True3. False4. False

Related questions

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : Differentiate between hackers and crackers. -Technology

Last Answer : Differences between hackers and crackers are as follows:HackersCrackersA hacker is a person intensely interested inthe arcane and recondite working of anycomputer operating system.A cracker ... andnever intentionally damage data.Crackers can easily be identified because theiractions are malicious.

Description : Differentiate between Crackers & Hackers. -Technology

Last Answer : In computing, a hacker is any skilled computer expert who uses their technical knowledge to overcome a problem or otherwise gains remote access to a protected computer system mainly to get thrill ... , crackers destroy vital data, deny legitimate users service, or cause problems for their targets.

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network: a) Hardware b) Software c) HTML d) None of These

Last Answer : a) Hardware

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Which of the following is not an example of worm? (a) MS_Blaster -Technology

Last Answer : (c) De bumper is a type of trojan horse.

Description : Which of the following statements is incorrect in the context of a worm? -Technology

Last Answer : (d) A worm is a self-replicating software and thus, it can travel on its own.

Description : A worm is a self_replicating program which eats up the entire disk space. -Technology

Last Answer : False Virus eats up the entire disk space.

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm

Last Answer : Spawn

Description : A good way to safeguard access to your computer is to protect it. (a) Deadbolt -Technology

Last Answer : (d) Password is a good way to safeguard access to your computer to protect it.

Description : A good way to safeguard access to your computer is to _________ protect it. -Technology

Last Answer : A good way to safeguard access to your computer isPasswordto protect it.

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : D. Script kiddies

Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol

Last Answer : c. ARP protocol

Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies

Last Answer : (c) disgruntled employees

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies

Last Answer : A. Disgruntled employees

Description : The casual organism of Polio is - (1) A fungi (2) A virus (3) A worm (4) A bacteria

Last Answer : (2) A virus Explanation: Polio is a highly infectious disease caused by a virus. Its causative agent, poliovirus, was identified in 1908 by Karl Landsteiner. The polio virus invades the nervous system, and can cause total paralysis in a matter of hours.

Description : Polio disease is caused by - (1) Bacteria (2) Fungi (3) Virus (4) Worm

Last Answer : (3) Virus Explanation: Polio, or poliomyelitis, is a crippling and potentially deadly infectious disease. It is caused by the poliovirus.

Description : Which one of the following causes the Chikungunia disease? (1) Bacteria (2) Helminthic worm (3) Protozoan (4) Virus

Last Answer : (4) Virus Explanation: Humans and other primates are the natural hosts for the chikungunya virus. The virus is spread to humans by the bite of an infected female Aedes species mosquito.

Description : Which of the following diseases is caused by a virus? (1) Polimyletis (2) Malaria (3) Whooping cough (4) Ring worm

Last Answer : (1) Polimyletis Explanation: Poliomyelitis, often called polio or infantile paralysis, is an acute, viral, infectious disease spread from person to person, primarily via the fecal-oral ... , resulting in polioencephalitis, producing apnea that requires mechanical assistance such as an iron lung.

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : An unsolicited e-mail message sent to many recipient at once is a (A) Worm (B) Virus (C) Threat (D) Spam

Last Answer : Answer: D

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : The casual organism of Polio is : (1) A fungi (2) A virus (3) A worm (4) A bacteria

Last Answer : A virus

Description : Which of the following diseases is caused by a virus? (1) Polimyletis (2) Malaria (3) Whooping cough (4) Ring worm

Last Answer : Polimyletis

Description : The small area network created around a bluetooth device is called ………….. -Technology

Last Answer : The small area network created around a bluetooth device is calledPAN (Personal Area Network).

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.