
CS-XII-COMPUTER NETWORKING-NETWORK SECURITY -15 POINTS
Authored by sunil verma
Computers
11th - 12th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
Protection
Identity theft
Pranks
Research purpose
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
A) Adware
B) Viruses
C) Worm
D) Trojans
E) Bots
3.
FILL IN THE BLANKS QUESTION
30 sec • 1 pt
(a) infects the master boot record and it is challenging and a complex task to remove this virus.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of them is not an ideal way of spreading the virus?
A Official Antivirus CDs
B USBs
C Emails
D Infected website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
A Backdoors
B Spyware
C Malware
D Key-logger
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A) Viruses
B) Trojan horses
C) Bots
D) Worms
E) Backdoors
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a program capable of continually replicating with little or no user intervention?
A) Virus
B) Trojan horses
C) Rootkit
D) Worms
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?