Question - 1
Which of the following is a class of computer threat
- DoS attacks
- Phishing
- Stalking
- Soliciting
Solutions
Answer- A
Question - 2
Firewalls are to protect against
- Virus Attacks
- Fire Attacks
- Unauthorized Attacks
- Data Driven Attacks
Solutions
Answer- C
Question - 3
The first computer virus is
- Morris Worm
- Creeper
- ILOVEYOU
- Stuxnet
Solutions
Answer- B
Question - 4
Which of the following is considered as the unsolicited commercial email?
- Virus
- Malware
- Spam
- All of the above
Solutions
Answer- C
Question - 5
Firewall is a type of ____________
- Virus
- Security threat
- Worm
- None of the above
Solutions
Answer- A
Question - 6
Which one of the following is a key function of firewall?
- Copying
- Moving
- Deleting
- Monitoring
Solutions
Answer- D
Question - 7
Below whic one is monitors user activity on internet and transmit that information in the background to someone?
- Malware
- Spyware
- Adware
- None of the above
Solutions
Answer- B
Question - 8
Like a virus , it is a self-replicating program it also propagates through computer network
- Phishing scam
- Worm
- Spyware
- Cracker
Solutions
Answer- B
Question - 9
Which of the following is not an external threat to a computer or a computer network
- Ignorance
- Trojan horses
- Adware
- Crackers
Solutions
Answer- A
Question - 10
- Are hacker programs that do not show up on the system
- Are legitimate programs that allow unauthorized access
- Really do not usually work
- Usually are immediately discovered
Solutions
Answer- B
Question - 11
Which one of the following is a type of antivirus program?
- Quick heal
- Mcafee
- Kaspersky
- All the above
Solutions
Answer- D
Question - 12
Which of the following tool is used for Wi-Fi hacking?
- Nessus
- Snort
- Wireshark
- Aircrack-ng
Solutions
Answer- D
Question - 13
What was the name of program Robert Thomas created?
- Virus
- Wireshark
- Nessus
- Creeper
Solutions
Answer- D
Question - 14
What was the name of first antivirus software?
- reaper
- Creeper
- tinkered
- repair
Solutions
Answer- A
Question - 15
Which of the following is not an information source over the internet for target attackers?
- YouTube
- Whois
- Nslookup
- Archive sites
Solutions
Answer- A
Question - 16
- Intranet service providers
- Internet service providers
- interneted service providers
- Information service providers
Solutions
Answer- B
Question - 17
cyberattack is any offensive maneuver that targets?
- computer information systems
- infrastructures
- computer networks
- All the above
Solutions
Answer- D
Question - 18
which factor is a measure of the actual damage achieved by an attack?
- Cyberwarfare
- Spectacularity
- Vulnerability
- All of the above
Solutions
Answer- B
Question - 19
Which is not a valid scanning method?
- Null Scan
- Cloud scan
- SYN Stealth scan
- Xmas Tree scan
Solutions
Answer- B
Question - 20
We should turn on ______ to protect Our Computer from hacker.
- VLC
- Script
- Antivirus
- Firewall
Solutions
Answer- D
Practice more set questions