0% found this document useful (0 votes)
120 views

Raza CHP 5

The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views

Raza CHP 5

The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 5

1. The broad term that encompasses different harmful software is:


 Virus
 Malware
 Adware
 Spyware n
2. The authentication mechanism that only allows the real person to access data or device is:
 Username and Password
 Biometric
 PIN
 Scan Code
3. Software’s are mostly protected under:
 Patents
 Trademarks
 Copyrights
 Logos
4. The professional ethics in computer field is important because
 Itis necessary by law.
 Violation can cause serious penalties.
 Itis useful for financial benefits.
 It creates healthy and positive work environment.
5. Free Antivirus Software often
 Expire after sometimes
 Offer only limited service
 Cannot be purchased
 Cannot be updated
6. 6.Copying and pasting some texts from internet without acknowledging the real author is an
example of:
 Illegal use of patent
 Information Piracy
 Copyright Violation
 Plagiarism
7. Since it does not harm or steal data, the least harmful malware is:
 Trojan
 Spyware
 Adware
 Virus
8. The malware that replicates itself and doesn't need to attach with any files is:
 Worm
 Spyware
 Adware
 Virus
9. Through which virus spreads
 Flash Disks and CDs
 All of them
 Email Attachments
 Internet Downloads
10. Click this link and win $5 voucher at McDonald’s”. This is an example of:
a) scam
b) phishing
c) clickjacking
d) hacking
11. Which of the following program we used to clean our PC from virus?
 Firefox
 PowerPoint
 Word
 Norton
12. Which software monitors user activity on internet and transmit that information in the
background to someone else?
 Adware
 Ransomware
 Spyware
 Malware
13. Firewall is a type of.
 Virus
 Word
 Security Guard
 Security threat
14. Most devastating loss to a company is:
 Loss of hardware
 Loss of software
 Loss of data
 Loss of printouts
15. Using pop-up windows to get a user to give out information is which type of social engineering
attack
 Human-based
 Computer-based
 Nontechnical
 Coercive
16. Which is populating the inbox of any target victim with unsolicited or junk emails?
 Spamming
 Phishing
 Hooking
 DDoS
17. Computer Viruses are:
 Naturally occur
 Machine made
 Man made
 By itself
18. Unwanted commercial email is known as.
 Malware
 Spyware
 Virus
 Spam
19. Secret words or numbers used for protection of devices is called
 biometrics data
 Backup
 Passwords
 Private words
20. Which statement describes "Hackers"?
 Break into other people's computers
 All have the same motive
 May legally break into computers as long as they do not do any damage
 are people who are allergic to computers

You might also like