The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
The document discusses various topics related to cybersecurity including different types of malware like viruses, spyware, and adware; authentication methods; intellectual property protections; computer ethics; antivirus software; plagiarism; and hacking. It provides examples of different security threats like phishing, spam, and social engineering attacks. It also covers computer viruses, firewalls, data loss prevention, and the definition of hackers.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 3
Chapter 5
1. The broad term that encompasses different harmful software is:
Virus Malware Adware Spyware n 2. The authentication mechanism that only allows the real person to access data or device is: Username and Password Biometric PIN Scan Code 3. Software’s are mostly protected under: Patents Trademarks Copyrights Logos 4. The professional ethics in computer field is important because Itis necessary by law. Violation can cause serious penalties. Itis useful for financial benefits. It creates healthy and positive work environment. 5. Free Antivirus Software often Expire after sometimes Offer only limited service Cannot be purchased Cannot be updated 6. 6.Copying and pasting some texts from internet without acknowledging the real author is an example of: Illegal use of patent Information Piracy Copyright Violation Plagiarism 7. Since it does not harm or steal data, the least harmful malware is: Trojan Spyware Adware Virus 8. The malware that replicates itself and doesn't need to attach with any files is: Worm Spyware Adware Virus 9. Through which virus spreads Flash Disks and CDs All of them Email Attachments Internet Downloads 10. Click this link and win $5 voucher at McDonald’s”. This is an example of: a) scam b) phishing c) clickjacking d) hacking 11. Which of the following program we used to clean our PC from virus? Firefox PowerPoint Word Norton 12. Which software monitors user activity on internet and transmit that information in the background to someone else? Adware Ransomware Spyware Malware 13. Firewall is a type of. Virus Word Security Guard Security threat 14. Most devastating loss to a company is: Loss of hardware Loss of software Loss of data Loss of printouts 15. Using pop-up windows to get a user to give out information is which type of social engineering attack Human-based Computer-based Nontechnical Coercive 16. Which is populating the inbox of any target victim with unsolicited or junk emails? Spamming Phishing Hooking DDoS 17. Computer Viruses are: Naturally occur Machine made Man made By itself 18. Unwanted commercial email is known as. Malware Spyware Virus Spam 19. Secret words or numbers used for protection of devices is called biometrics data Backup Passwords Private words 20. Which statement describes "Hackers"? Break into other people's computers All have the same motive May legally break into computers as long as they do not do any damage are people who are allergic to computers