Computer security - Computers quiz 1

By CareerCadets

Computer security - Computers Online Quiz 1

Computer security - Computers quiz 1 is a free online quiz challenge under Computer security - Computers category. There are 589 free online quiz challenges available in Computers category


The unauthorized activities of malicious software is called __________

A virus _______is a false warning about a computer virus.

A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a userĂ¢??s knowledge is called ________

Consider the following statements1. Computer worm uses a computer network to send copies of itself to other nodes without any user intervention.2. Like a virus, worm needs to attach itself to an existing program.Which of the statements given above is/are correct?

The phrase _________describes viruses, worms, Trojan horse attack applets, and attack scripts.

The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _________

__________ is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities over the telephone.

Hardware or software designed to guard against unauthorized access to a computer network is known as ________

Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ___________

........ is one reason for problems of data integrity.

Invite your friends to Computer security - Computers quiz 1 Quiz

gmail WhatsApp Facebook Twitter Outlook Linkedin