Q. Which among the following add clicking malware created a buzz around the world with affecting millions of Android device users?
(a) WannaCry
(b) Judy
(c) Diva
(d) TrickBot
(e) RIG Exploit Kit
Q2. The recent outbreak of ransomware caused frenzy worldwide. Through which cryptocurrency was the attacker asking the victims to pay ransom in order to get back their encrypted files?
(a) Ethereum
(b) Dash
(c) Litecoin
(d) Bitcoin
(e) Siacoin
Q3. Which among the following is true regarding computer worms?
(a) These programs have the ability to replicate themselves.
(b) Their replicating nature consumes hard drive space, thus slow down the machine.
(c) They are attached to an executable file, which means they may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file.
(d) Only (a) and (b)
(e) All of the above
Q4. Asymmetric cryptography, also known as public key cryptography, uses __________ and _________ keys to encrypt and decrypt data.
(a) pattern, coder
(b) coder, user
(c) public, private
(d) hypo, hyper
(e) lock, coder
Q5. Which among the following is not a malware?
(a) VMware
(b) Bots
(c) Adware
(d) Rootkits
(e) Spam
Q6. Which among the following technology can be used for an effective online backup of data?
(a) Space
(b) Sun
(c) Rain
(d) Tree
(e) Cloud
Q7. Which among the following is the act of hacking a website or computer network in an effort to convey a social or political message?
(a) Spamming
(b) Hacktivism
(c) Phising
(d) Hacking
(e) Spoofing
Q8. Which term refers to a group of computers controlled without their owners’ knowledge and used to send spam or make denial of service attacks?
(a) Botnet
(b) Back Door
(c) Logic Bomb
(d) Piggybacking
(e) Wiretapping
Q9. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting
Q10. The type of threats on the security of a computer system or network are:
i) Interruption ii) Interception iii) Modification
iv) Creation v) Fabrication
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v
Q11. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True
Q12. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these
Q13. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these
Q14. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these
Q15. The first Computer Virus is __________.
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these