MCQ

MCQ's - Internet

1. Which of the following is NOT a purpose of antivirus programs?

o Copy the name of the virus and send it to Microsoft for inspection

o Search for viruses

o Remove any identified viruses

o Notify a user if a virus is found

2. Which type of program gathers user information and sends it to an outside source through the Internet?

o Spyware

o Webjacker software

o Antivirus software

o Firewall

3. Which type of software can be used to restrict users so they can only open files related to their work

o Antivirus

o Biometrics

o Access-control

o Firewall

4. On which of the following is firewall software usually stored and run?

o LAN

o Dedicated computer

o Client computer

o Email server

5. Which of the following can be used to scramble a message by applying a secret numerical code?

o Audit

o UPS

o Firewall

o Encryption

6. Which type of storage technology allows multiple hard disks to operate as a single unit, thereby keeping copies of important data in several locations?

o RTF

o UPS

o RAID

o FTP

7. Which type of software plugs potential security breaches in the operating system or application?

o Spybot

o Encryption

o Security patches

o Firewall

8. Which of the following is NOT a rule for safe computing

o Lock it up if it's sensitive

o Disinfect regularly

o Open all email attachments

o Prepare for the worst

9. Which term is used for the physical characteristics about you that could be used to grant computer access, such as a fingerprint or retinal scan?

o Biometrics

o Access keys

o Passwords

o Bio-characteristics

10. Which of the following is TRUE about security procedures established by an individual or by a company?

o Modern software eliminates the need for additional security.

o They eliminate all possibility of a security breach.

o They reduce, but do not eliminate, the possibility of a security breach.

o They can be prohibitively expensive so that the risk is not worth the expense.

11. Most computer viruses are NOT operating system specific.

True

False

12. When receiving emails from unknown senders, caution should be used when opening the email attachments as the attachments could contain viruses.

True

False

13. The crime of identify theft requires a computer.

True

False

14, Viruses do more harm to computers than software bugs.

True

False

15. Two types of Trojan horses are logic bombs and time bombs.

True

False

16. Match each computer term with the correct definition

A matching question presents 6 answer choices and 6 items. The answer choices are lettered A through F. The items are numbered 16.1 through 16.6. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right columns.