Computer Computer security Set paper For SSC Exam.
Q1.Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
- Malware
- Spyware.
- Adware.
- All of the above
Answer:- (B)
- Piracy
- Plagiarism
- Intellectual property rights
- All of the above
Answer:- (D).
- firewall
- Virus
- Trojan horse
- None of the above
Answer:- (A)
- are legitimate programs that allow unauthorized access
- are hacker programs that do not show up on the system
- really do not usually work
- are usually immediately discovered
Answer:- (A).
- Hackers
- Viruses
- Identity theft
- Spam
Answer:- (D).
- Phishing
- Firewall
- Spam
- Adware
Answer:- (C).
- Passwords list secret
- Security purpose
- Faster execution
- Both (a) and (b)
Answer:- (D).
- Anti virus
- Cookies
- Firewall
- Cyber safety
Answer:- (C).
- X.508
- X.509
- D.508
- D.507
Answer:- (B).
- An attempt to crack passwords using words that can be found in dictionary
- An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
- An attempt to crack passwords using a combination of characters, numbers, and symbols
- An attempt to crack passwords by replacing characters with numbers and symbols
Answer:- (B).
Copyright © 2022 Shineskill Software Pvt. Ltd., All rights reserved.