COMPUTER KNOWLEDGE
1. Which is true about worms?
a. Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
b. Worms on existing programs and can only be activated when a user opens the program
c. Worms vary and hide themselves in the operating system
d. All of the above
2. RATs stands for?
a. Rootkits administration tools
b. Remote access tools
c. Remote administration tools
d. Remote attack tools
3. Network security consists of:
a. Protection
b. Detection
c. Reaction
d. All of the above
4. Which one of the following is actually considered as the first computer virus?
a. Sasser
b. Blaster
c. Creeper
d. Both a and c
5. Code Red is a type of ______
a. An antivirus program
b. A photo editing software
c. A computer virus
d. A video editing software
6. Which of the following can be considered as the elements of cyber security?
a. Application security
b. Operational security
c. Network security
d. All of the above
7. In order to ensure the security of the data/information, we need to _____ the data
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
8. If you cannot delete malware infected file, what is good method to try first?
a. Reformat then attempt to delete the file
b. Run windows Repair
c. Run windows restore
d. Boot in windows safe mode and attempt to delete the file
9. Cyber-crime can be categorized into_____ types.
a. 4
b. 3
c. 2
d. 6
10. Which of the following is not a type of peer-to- peer cyber-crime?
a. Phishing
b. Injecting Trojans to a target victim
c. MiTM
d. Credit card details leak in deep web
ANSWER KEY
1. A
2. C
3. D
4. C
5. C
6. D
7. A
8. D
9. C
10. D