Threats (A)
Threats (B)
Threats (C)
Threats (D)
Threats (E)
100
What does Virus stand for?__A) Vital Information Resource Under Siege__B) Viral Information Resource Under Siege__C) Vital Information Resource Under Sieze__D) Vital Information Resource Under Security__E)
A) Vital Information Resource Under Siege
100
A Firewall could be a Hardware or a Software.__A) TRUE__B) FALSE
A) TRUE
100
What does WORM stand for?__A) Write Over Read Many__B) Write Once Reading Many__C) Write Once Read Many __D) None of the mentioned options__E)
C) Write Once Read Many
100
When a person has unauthorized access to certain Private Information what is he called?__A) Hacker__B) Spy__C) Castler__D) Forger
A) Hacker
100
Is IP Spoofing used as one of the methods used to Hack into a network__A) Yes__B) No
A) Yes
200
What is a Trojan Horse?__A) They cannot delete Hard drive partitions__B) They don't pretend to be a legitimate program but they cause damage to the system__C) They are not malicious Software__D) They pretend to be a legitimate program but they cause damage to the system
D) They pretend to be a legitimate program but they cause damage to the system
200
Why are Trojans hard to detect?__A) Because they hide__B) Because Anti Viruses cannot detect Trojans__C) Trojan is always present in applications which are not scanned
A) Because they hide
200
What is an Antivirus?__A) Software to prevent Virus in the system__B) Software to run virus in the System__C) Software to remove Virus in the System
C) Software to remove Virus in the System
200
Trojan horses are not self-replicating which distinguishes them from viruses and worms__A) TRUE__B) FALSE
A) TRUE
200
A computer program that captures keystrokes of a computer user and stores them.__A) KeyTracker__B) Keylogger__C) Key cracker__D) Key locker
B) Keylogger
300
What is DOS attack?__A) Denial of Service__B) Deny of Service__C) Die of Service__D) None of the mentioned answers
A) Denial of Service
300
What is NBRT?__A) Norton Bootable Recovery Tool__B) Norton Boot Repair Tool__C) Norton Bootable Repair Tool__D) None of the mentioned answers
A) Norton Bootable Recovery Tool
300
The concept of sending a fake email in order to steal personal information is known as:__A) phishing__B) pharming__C) spying__D) tracking
A) phishing
300
A keylogger is__A) a tool which enhances the performance of keyboards.__B) a special type of multimedia keyboard__C) a program which records keystrokes as an attempt to steal personal information__D) a random password generating tool.
C) a program which records keystrokes as an attempt to steal personal information
300
Which of the following categories are used in the Symantec risk classification system? *i.Performance impact*ii.Ease of removal*iii.Privacy*iv.Stealth*v.No Answer __A) i__B) i\ii__C) i\ii\iii__D) i\ii\iii\iv__E) ii\iii\iv\v
C) i\ii\iii\iv
400
Identify the correct delivery vectors of adware and spyware programs. *i.Drive by Downloads | Active X*ii.Social engineering Banner Ads*iii.Peer to Peer*iv.By exploiting software vulnerabilities*v.No Answer __A) i__B) i\ii__C) i\ii\iii__D) i\ii\iii\iv__E) ii\iii\iv\v
C) i\ii\iii\iv
400
Identify the load points from the following: *i.Hkey_Local_Machine\System\CurrentControlSet\Services*ii.Hkey_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Run*iii.Hkey_Local_Machine\Software\Microsoft\Windows\CurrentVersion\RunServices*iv.The startup folder*v.No Answer __A) ii\iii\iv__B) i\iii\v__C) ii\v__D) i\iv__E) iii\iv\v
A) ii\iii\iv
400
Macro viruses are viruses that__A) infect Microsoft Office files such as Word and Excel__B) infect Windows applications such as Paint and Solitaire__C) infect computers in large proportions.__D) spread through the network by exploiting network vulnerabilities
A) infect Microsoft Office files such as Word and Excel
400
What is a joke program?__A) It is a program which is full of bugs and crashes very often__B) It is a program which displays random jokes in the Internet browser daily__C) It is a program which allows writing jokes and distributing them on the Internet__D) It is a program which creates general distraction and nuisance by displaying threat-like messages or simulating threat-like behavior.
D) It is a program which creates general distraction and nuisance by displaying threat-like messages or simulating threat-like behavior.
400
What is a Rogue Antispyware?__A) A firewall program which monitors incoming and outgoing traffic and blocks malicious traffic__B) program that tricks PC users into thinking it's legitimate security software__C) A program that send junk emails__D) An antivirus program which helps remove spyware
B) program that tricks PC users into thinking it's legitimate security software
500
An Adware program is a__A) program which displays ads on the user's machine based__B) Program which saves the keystrokes of the user__C) Program which blocks ad's on users machine__D) Program which tricks the user into thinking its legitimate security software
A) program which displays ads on the user's machine based
500
Which of the following is correct about a spyware program? A spyware program__A) Monitors and blocks inappropriate websites__B) Attaches itself to executable files with the intention of corrupting them__C) Spies on the user's activity to steal personal information__D) Detects and removes viruses and other threats
C) Spies on the user's activity to steal personal information
500
Which of the following is correct about the Hosts file?__A) The hosts file is used by the operating system to store recently visited websites' addresses__B) The host file is used by the operating system to map host names to IP address__C) Host file is a rootkit which is hard to detect__D) Host file is used by the operating system to save temporary information
B) The host file is used by the operating system to map host names to IP address
500
Which of the following is TRUE about reputation-driven security?__A) It reduces the time taken to perform a scan__B) It shows the trust level of local files so that the users have more information about files__C) It forces the scanning engine to scan every file which is on the computer, thus ensuring maximum protection.__D) It is a heuristics-based scan performed using algorithms that study a file's behavior rather than looking at any kind of definitions or any other information
D) It is a heuristics-based scan performed using algorithms that study a file's behavior rather than looking at any kind of definitions or any other information
500
Macro viruses are viruses that__A) infect Microsoft Office files such as Word and Excel__B) infect Windows applications such as Paint and Solitaire__C) infect computers in large proportions.__D) spread through the network by exploiting network vulnerabilities
A) infect Microsoft Office files such as Word and Excel