1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity
3. The type of threats on the security of a computer system or network are ……………………..
i) Interruption ii) Interception iii) Modification
iv) Creation v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v
4. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm
5. The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
6. The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
7. Which of the following malicious program do not replicate automatically?
A) Trojan Horse
B) Virus
C) Worm
D) Zombie
8. …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb
9. State whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
A) True, False
B) False, True
C) True, True
D) False, False
10. A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answers:
1. B) Integrity 2. A) Confidentiality 3. C) i, ii, iii and v only 4. D) Worm 5. A) Trap doors | 6. C) Logic Bomb 7. A) Trojan Horse 8. C) Trojan Horses 9. C) True, True 10. B) Virus |
You may also wanted to view the following related posts
- MCQ of Computer Security with answer set – 2
- Solved MCQ of Operating System Principles set-2
- Solved MCQ of Operating System Theory set-3
- MCQ of Operating System with answer set-4
- Solved MCQ of Operating System Set-5
You can view the following other posts
- Solved MCQ of Database Management System (DBMS) Set - 3
- Solved MCQ of System Analysis and Design Set-3
- Solved MCQ of Data Structure Set - 2
- Solved MCQ of Java for Java Proficiency test set-3
- MCQ of C++ with answer Set-2
- MCQ of Computer Networking with answer set-4
0 التعليقات:
إرسال تعليق