Class 11 Online Access and Computer Security MCQ Quiz

Preview



0
Created on By Lucky

Class 11 Online Access and Computer Security MCQ Quiz

1 / 36

Digital certificates a way of authenticating the creator's identity online.

 

2 / 36

Digital Certificate can verify the identify of a message sender.

 

3 / 36

Adware is a useful program to earn something online.

will give output

4 / 36

Digital signatures are useful for authenticating the identity of creator or producer of digital information.

 

5 / 36

Unauthorized monitoring of other people's communication is called Eavesdropping.

 

6 / 36

A keylogger is a useful program.

 

7 / 36

Some computer viruses are just annoying and do not cause harm to data.

 

8 / 36

Adware is harmless when money is paid .

 

9 / 36

A Trojan is a utility program which turns dangerous only after its expiry date.

 

10 / 36

A firewall  is a virtual 'wall' in  software or hardware that controls access over network computers and protects data on computer network.

 

11 / 36

A worm can eat up the entire disk space.

 

12 / 36

Hacking a computer is always illegal and punishable by law.

 

13 / 36

A software/hardware that prevents unauthorized access to  a network is called ____ .

 

14 / 36

Mcaffe is an example of ___ software

 

15 / 36

_____ refers to the sending of bulk mail from an unidentified source.

 

16 / 36

____ is the fraudulent process of attempting to acquire sensitive information  pertaining to a user.

 

17 / 36

___ is a program that can scan for the malware in your computer.

 

18 / 36

____ is a general term used to refer to Viruses, Worms, Spyware, Adware etc.

 

19 / 36

_____ is a software that spies on your activities and reports it to people/websites.

 

20 / 36

A ___  ____ is a program that comes in the disguise of a utility program but causes damage to data/files on computer.

 

21 / 36

A ___ is a self replicating program, which eats up the entire disk space.

 

22 / 36

____ _____ are malicious programs that cause damage to data and files on a system.

 

23 / 36

____ are attempts by individuals to obtain confidential information from you to falsifying their identify.

 

24 / 36

A___ is a computer program that can replicate itself and spread from one computer to another .

 

25 / 36

Which of the following  is responsible for breaking the flow of your internet browsing by showing unwanted ads from time to time?

 

26 / 36

____ software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

 

27 / 36

Firewalls are used to protect against ___ .

 

28 / 36

To protect yourself from computer hacker, you should turn on a ______ .

 

29 / 36

Key logger is a ____.

 

30 / 36

Which of the following is/are threats for electronic payment systems?

 

31 / 36

What is short name for harmful software designed to disrupt computer operation, gather sensitive information , or gain unauthorized access to computer systems ?

 

32 / 36

To protect a computer from computer security threats like Viruses, Spyware etc.  you should install ____ in your computer.

 

33 / 36

Quick Heal is an example of

 

34 / 36

Harmful softwares known as malicious softwares are called ___ ?

 

35 / 36

A software/hardware mechanism to filter the information coming through an Internet connection to a networking or computer system, is called a ____.

36 / 36

Which of the following is an external threat to a computer or a computer network ?

 

 

Your score is

The average score is 0%

0%



 

Lesson tags: Class 11 Online Access and Computer Security, Class 11 Online Access and Computer Security MCQ, python quiz class 11
Back to: CBSE class 11 Computer Science Notes