computer MCQs

11th • Chapter 06

50 Questions TextBook
1

What is defined as a system of safeguards to protect a computer system and data from unauthorized access?

A
Copyright
B
Security
C
Privacy
D
Legislation
2

Which authentication approach involves using a key, badge, or token?

A
What you know
B
What you do
C
What you are
D
What you have
3

Fingerprints, voice recognition, and eye retina scans are examples of which security measure?

A
Passwords
B
Tokens
C
Biometrics
D
Badges
4

According to the text, what does a computer virus program attach itself to?

A
Hardware devices
B
Operating system kernel
C
Other executable files
D
Data files only
5

What is the formal description of a virus?

A
A program that physically destroys hardware
B
A destructive program that generates copies of itself and attaches to other programs
C
A program that only steals data
D
A program that only slows down the network
6

Which of the following is described as a primary means for spreading viruses nowadays?

A
Pirated Software
B
Removable storage media
C
Email messages
D
Network downloads
7

How does a virus commonly spread through networks?

A
By attaching to downloaded executable files or data
B
By infecting the network cables
C
By changing the network's IP address
D
By overloading the network router
8

What type of software might intentionally contain a virus program that activates if license files are not found?

A
Freeware
B
Open-source software
C
Pirated software
D
Shareware
9

Which type of virus modifies the program in the first sector of a disk?

A
Logic bomb
B
Trojan horse
C
Chernobyl Virus
D
Boot sector virus
10

The Chernobyl virus is known for deleting which types of files?

A
System registry files
B
All .exe files
C
Microsoft Office files and partition information
D
Only temporary internet files
11

Which virus is characterized by being set to go off at a certain date and time?

A
Redlof
B
Logic bomb
C
Boot sector virus
D
Trojan horse
12

What is the term for a virus that covertly places destructive instructions within a legitimate program?

A
Polymorphic virus
B
Worm
C
Trojan horse
D
Boot sector virus
13

The Redlof virus is described as what type of virus?

A
Boot sector virus
B
Logic bomb
C
Trojan horse
D
Polymorphic virus
14

Redlof relies on a vulnerability in which Microsoft component to execute itself?

A
Internet Explorer
B
Microsoft Office
C
Windows Update
D
Microsoft ActiveX Component
15

What is a key method mentioned to safeguard against virus attacks?

A
Deleting all emails immediately
B
Never using the internet
C
Always keeping a backup of your data
D
Reinstalling the OS weekly
16

Which of the following is NOT a recommended antivirus software mentioned in the text?

A
Norton
B
Kaspersky
C
McAfee
D
Dr. Solomon's
17

The issue that arises from unauthorized users viewing or obtaining sensitive online data is known as?

A
Data Processing
B
Data Redundancy
C
Data Security
D
Data Warehousing
18

Which of the following is listed as a security violation?

A
Using a strong password
B
Updating antivirus software
C
Breaking into a computer room to steal storage devices
D
Backing up data regularly
19

Sending a large number of requests to make a computer unavailable to authorized users is called?

A
A virus attack
B
Hacking
C
A denial of service situation
D
A logic bomb
20

What is the first solution proposed for preventing unintentional deletion of sensitive data by an authorized user?

A
Taking periodic backups
B
Using strong encryption
C
Assigning proper rights to users
D
Scanning for viruses
21

What should be used so that if someone gets access to data, they cannot make any sense out of it?

A
Password protection
B
A log file
C
A strong encryption algorithm
D
Proper user rights
22

What is a primary principle of data protection regarding personal data kept by an organization?

A
It should be disclosed to anyone who asks
B
It should never be disclosed to unauthorized persons
C
It should be deleted after one day
D
It can be sold for marketing purposes
23

According to the text, an individual has the right to stop the organization from doing what with their data?

A
Backing it up
B
Processing it
C
Encrypting it
D
Updating it
24

The 1980 Privacy Protection Act prohibits agents of the federal government from making unannounced searches of what?

A
Private homes
B
Press offices
C
Bank accounts
D
University records
25

Which act was the first piece of legislation to regulate the use of information processed on a computer?

A
The 1980 Privacy Protection Act
B
The 1988 Video Privacy Protection Act
C
The 1984 Cable Communications Policy Act
D
The Computer Misuse Act 1990
26

How many principles does the 'Data Protection Act 1984' consist of?

A
Five
B
Six
C
Seven
D
Eight
27

One principle of the Data Protection Act 1984 is that personal data shall be accurate and, where necessary, kept...?

A
On a single computer
B
Up to date
C
For at least 10 years
D
In a simple format
28

The 1987 Computer Security Act makes it illegal to affect computer security files and what else?

A
Data backups
B
Telecommunication
C
Software licenses
D
Hardware maintenance
29

What does the 1988 Video Privacy Protection Act prevent retailers from doing?

A
Selling videos at a high price
B
Renting videos to minors
C
Disclosing a person's video rental records without a court order
D
Copying video tapes
30

The Computer Misuse Act 1990 was passed to deal with the problem of what?

A
Software piracy
B
Data loss
C
Hacking of computer systems
D
Virus creation
31

Which of the following is one of the three key offences under the Computer Misuse Act 1990?

A
Creating a computer virus
B
Selling pirated software
C
Unauthorized modification of computer material
D
Forgetting a password
32

The 1998 Data Protection Act applies to computerized personal data and what other type of files?

A
Unstructured manual files
B
Audio recordings
C
Video surveillance
D
Personal data held in structured manual files
33

The principal law governing software piracy mentioned in the text is the...?

A
Computer Misuse Act 1990
B
Copyright Act 1976
C
Data Protection Act 1984
D
Privacy Protection Act 1980
34

Software is believed to be a form of what, justifying copyright protection?

A
Public domain material
B
Freeware
C
Intellectual property
D
Hardware component
35

Which approach to access control uses standard user-ids and passwords?

A
What you have
B
What you know
C
What you do
D
What you are
36

What is a common misconception about computer viruses mentioned in the text?

A
They can steal passwords
B
They can delete files
C
They can physically destroy hardware
D
They can spread through email
37

What kind of files does a boot sector virus typically attach to?

A
.txt and .doc files
B
.jpg and .png files
C
.exe, .com, and .dll files
D
.mp3 and .wav files
38

The example 'FormatC' is given for which type of malicious program?

A
Redlof
B
Logic bomb
C
Trojan horse
D
Chernobyl virus
39

What is a recommended practice when receiving an email, even from a known sender?

A
Forward it to others
B
Reply immediately
C
Delete it without reading
D
Scan it for viruses
40

A user's right to view data kept about them and to have it corrected or erased is a principle of which act?

A
Computer Misuse Act 1990
B
Copyright Act 1976
C
Data Protection Act 1984
D
Privacy Protection Act 1980
41

Placing computers and backing storage devices in locked rooms is a measure against what?

A
Virus attacks
B
Software piracy
C
Unauthorized physical access
D
Network slowdowns
42

According to data protection principles, for how long should an organization keep personal data?

A
Indefinitely
B
For one year only
C
No longer than is necessary for its purpose
D
As long as the user is alive
43

The act that prevents the government from comparing certain records to find a match is the...?

A
Video Privacy Protection Act of 1988
B
Computer Security Act of 1987
C
Computer Matching and Privacy Protection Act of 1988
D
Computer Misuse Act 1990
44

What is the term for making illegal copies of copyrighted software?

A
Hacking
B
Piracy
C
Encryption
D
Backup
45

What is the actual problem in the loss of data for transaction-based systems?

A
Difficulty in recovering it in time
B
Insurance does not cover it
C
The hardware is expensive
D
The software is hard to find
46

A virus can make network resources unavailable by...?

A
Deleting user accounts
B
Encrypting all data on the server
C
Copying itself to all computers and sending data constantly
D
Shutting down the network switch
47

What is the second solution for preventing unintentional data modification by authorized users?

A
Using firewalls
B
Periodic backup of data
C
Changing passwords weekly
D
Installing more memory
48

To ensure privacy, an organization collecting data should only collect data that is...?

A
Interesting for research
B
Publicly available
C
Adequate and necessary for its working
D
Easy to store
49

An individual must be informed about the identity of the organization and the purpose of data collection. This is a principle of what?

A
Copyright Law
B
Data Protection Acts
C
Computer Security
D
Antivirus policy
50

The Computer Misuse Act 1990 recognizes 'Unauthorized access with intent to commit or facilitate commission of further offences' as a key...?

A
Security measure
B
Privacy right
C
Offence
D
Data principle