Home / Computer Fundamentals / Computer Fundamental Miscellaneous :: section-5

Computer Fundamentals :: Computer Fundamental Miscellaneous

  1. What is the name of an application program that gathers user information and sends it to someone through the Internet?

  2. A.

     A virus

    B.

     Spybot

    C.

     Logic bomb

    D.

     Security patch


  3. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

  4. A.

     More complicated

    B.

     More difficult

    C.

     Easier

    D.

     Slower


  5. HTML viruses infect:

  6. A.

     Your computer

    B.

     A Web page in the HTML code

    C.

     Both a Web page and the computer that is viewing it.

    D.

     None of these


  7. Software programs that close potential security breaches in an operating system are known as:

  8. A.

     Security breach fixes

    B.

     Refresh patches

    C.

     Security repairs

    D.

     Security patches


  9. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

  10. A.

     A virus

    B.

     A Trojan Horse

    C.

     Cracking

    D.

     A denial of service attack.


  11. __________ is the measurement of things such as fingerprints and retinal scans used for security access.

  12. A.

     Biometrics

    B.

     Biomeasurement

    C.

     Computer security

    D.

     Smart weapon machinery


  13. What is the most common tool used to restrict access to a computer system?

  14. A.

     User log in

    B.

     Passwords

    C.

     Computer keys

    D.

     Access-control software


  15. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

  16. A.

     Hacker-proof program

    B.

     Firewall

    C.

     Hacker-resistant server

    D.

     Encryption safe wall


  17. The scrambling of code is known as:

  18. A.

     Encryption

    B.

     A firewall

    C.

     Scrambling

    D.

     Password-proofing


  19. If you want to secure a message, use a(n):

  20. A.

     Cryptology source

    B.

     Encryption key

    C.

     Encryption software package

    D.

     Cryptosystem