Top

Computer Security

61.

To protect a computer from virus, you should install -------- in your computer.

Answer: A

No answer description available for this question
 

Enter details here

Answer: A

No answer description available for this question

Enter details here

Answer: C

No answer description available for this question

Enter details here

64.

How does a Le-Hard virus come into existence?

Answer: C

No answer description available for this question

Enter details here

Answer: D

No answer description available for this question

Enter details here

66.

…………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.

Answer: C

No answer description available for this question

Enter details here

67.

All of the following are examples of real security and privacy threats except:

Answer: C

No answer description available for this question

Enter details here

68.

A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.

Answer: A

No answer description available for this question

Enter details here

Answer: B

No answer description available for this question
 

Enter details here

70.

What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?

Answer: D

No answer description available for this question
 

Enter details here

Loading…
Tags: Computer Security Questions and Answers || Computer Security MCQ Questions and Answers || Computer Security GK Questions and Answers || Computer Security GK MCQ Questions || Computer Security Multiple Choice Questions and Answers || Computer Security GK || GK on Computer Security || Computer Awareness Questions and Answers || Computer Awareness MCQ Questions and Answers || Computer Awareness GK Questions and Answers || GK on Computer Awareness