MCQ of Computer Security and Network Security
MCQ of Computer Security and Network Security
MCQ of Computer Security and Network Security
B) Virus
C) Worm
D) Zombie
8. programs can be used to accomplish functions indirectly that an
unauthorized user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb
9. State whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
A) True, False
B) False, True
C) True, True
D) False, False
10. A .. is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to infect other
programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answers:
1.
2.
3.
4.
5.
B) Integrity
A) Confidentiality
C) i, ii, iii and v only
D) Worm
A) Trap doors
C) Logic Bomb
A) Trojan Horse
C) Trojan Horses
C) True, True
10. B) Virus
D) Execution phase
10. A is a program that secretly takes over another Internet-attached
computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
Answers:
1.
2.
3.
4.
5.
B) Zombie
C) ii, i, iv an iii
C) Parasitic Virus
A) Stealth virus
B) Polymorphic Virus
B) mutation engine
C) Both i and ii
D) All of the above
B) Propagation phase
10. B) Zombie