Computer Security MCQ Questions and Answers
21. |
-------- are often delivered to a PC through an email attachment and are often designed to do harm. |
|
- A. Spam
- B. Email
- C. Portals
- D. Virus
|
22. |
The altering of data so that it is not usable unless the changes are undone is |
|
- A. ergonomics
- B. compression
- C. biometrics
- D. encryption
|
23. |
When a logic bomb is activated by a time related event, it is known as ------- |
|
- A. virus
- B. trojan horse
- C. time related bomb sequence
- D. time bomb
|
24. |
A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard disk). |
|
- A. Ms Word
- B. Ms Access
- C. Antivirus
- D. Computer Virus
|