Computer Security & Risks Question Preview (ID: 9549)
Try These Questions.
TEACHERS: click here for quick copy question ID numbers.
Which of the following passwords is most SECURE?
a) password
b) CTOS
c) Ib4ExaC
d) 123456
Which of these words means Faking?
a) Bombing
b) Hijacking
c) Cracking
d) Spoofing
Which of these is a piece of code that ATTACHES itself to an application program and secretly cause harm to a computer when you execute the program?
a) Virus
b) Spybot
c) Trojan
d) Worm
What can a surge protector protect a system from?
a) Viruses
b) All of the above
c) Denial-of-services (DoS) attacks
d) Power spikes
How does an antivirus software idenfity a malware?
a) Digital Signature
b) Virus Signature
c) Virus Certificate
d) Digital Certificate
A computer which has been attacked and controlled remotely by an outsider is known as ___.
a) bot
b) rootkit
c) ghost
d) zombie
A backup system used when there is power failure is ____
a) DoS
b) RSS
c) UPS
d) Bot
Which of this is a Wireless Security Standard that secures your Wireless connections?
a) WPA2
b) RAID
c) WIN
d) WIFI
If I backup my entire harddisk, I am performing a ___ backup
a) restore
b) 3 generation
c) full
d) incremental
Using physical locks, security cameras can prevent ___
a) software theft
b) all of the above
c) information theft
d) hardware theft
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 9549 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 9549 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register