computer MCQs
11th • Chapter 06
50 Questions TextBook
1
What is defined as a system of safeguards to protect a computer system and data from unauthorized access?
2
Which authentication approach involves using a key, badge, or token?
3
Fingerprints, voice recognition, and eye retina scans are examples of which security measure?
4
According to the text, what does a computer virus program attach itself to?
B
Operating system kernel 5
What is the formal description of a virus?
A
A program that physically destroys hardwareB
A destructive program that generates copies of itself and attaches to other programsC
A program that only steals dataD
A program that only slows down the network 6
Which of the following is described as a primary means for spreading viruses nowadays?
B
Removable storage media 7
How does a virus commonly spread through networks?
A
By attaching to downloaded executable files or dataB
By infecting the network cablesC
By changing the network's IP addressD
By overloading the network router 8
What type of software might intentionally contain a virus program that activates if license files are not found?
9
Which type of virus modifies the program in the first sector of a disk?
10
The Chernobyl virus is known for deleting which types of files?
C
Microsoft Office files and partition informationD
Only temporary internet files 11
Which virus is characterized by being set to go off at a certain date and time?
12
What is the term for a virus that covertly places destructive instructions within a legitimate program?
13
The Redlof virus is described as what type of virus?
14
Redlof relies on a vulnerability in which Microsoft component to execute itself?
D
Microsoft ActiveX Component 15
What is a key method mentioned to safeguard against virus attacks?
A
Deleting all emails immediatelyB
Never using the internetC
Always keeping a backup of your dataD
Reinstalling the OS weekly 16
Which of the following is NOT a recommended antivirus software mentioned in the text?
17
The issue that arises from unauthorized users viewing or obtaining sensitive online data is known as?
18
Which of the following is listed as a security violation?
A
Using a strong passwordB
Updating antivirus softwareC
Breaking into a computer room to steal storage devicesD
Backing up data regularly 19
Sending a large number of requests to make a computer unavailable to authorized users is called?
C
A denial of service situation 20
What is the first solution proposed for preventing unintentional deletion of sensitive data by an authorized user?
A
Taking periodic backupsB
Using strong encryptionC
Assigning proper rights to users 21
What should be used so that if someone gets access to data, they cannot make any sense out of it?
C
A strong encryption algorithm 22
What is a primary principle of data protection regarding personal data kept by an organization?
A
It should be disclosed to anyone who asksB
It should never be disclosed to unauthorized personsC
It should be deleted after one dayD
It can be sold for marketing purposes 23
According to the text, an individual has the right to stop the organization from doing what with their data?
24
The 1980 Privacy Protection Act prohibits agents of the federal government from making unannounced searches of what?
25
Which act was the first piece of legislation to regulate the use of information processed on a computer?
A
The 1980 Privacy Protection ActB
The 1988 Video Privacy Protection ActC
The 1984 Cable Communications Policy ActD
The Computer Misuse Act 1990 26
How many principles does the 'Data Protection Act 1984' consist of?
27
One principle of the Data Protection Act 1984 is that personal data shall be accurate and, where necessary, kept...?
28
The 1987 Computer Security Act makes it illegal to affect computer security files and what else?
29
What does the 1988 Video Privacy Protection Act prevent retailers from doing?
A
Selling videos at a high priceB
Renting videos to minorsC
Disclosing a person's video rental records without a court order 30
The Computer Misuse Act 1990 was passed to deal with the problem of what?
C
Hacking of computer systems 31
Which of the following is one of the three key offences under the Computer Misuse Act 1990?
A
Creating a computer virusB
Selling pirated softwareC
Unauthorized modification of computer material 32
The 1998 Data Protection Act applies to computerized personal data and what other type of files?
A
Unstructured manual filesD
Personal data held in structured manual files 33
The principal law governing software piracy mentioned in the text is the...?
A
Computer Misuse Act 1990C
Data Protection Act 1984D
Privacy Protection Act 1980 34
Software is believed to be a form of what, justifying copyright protection?
35
Which approach to access control uses standard user-ids and passwords?
36
What is a common misconception about computer viruses mentioned in the text?
A
They can steal passwordsC
They can physically destroy hardwareD
They can spread through email 37
What kind of files does a boot sector virus typically attach to?
C
.exe, .com, and .dll files 38
The example 'FormatC' is given for which type of malicious program?
39
What is a recommended practice when receiving an email, even from a known sender?
C
Delete it without reading 40
A user's right to view data kept about them and to have it corrected or erased is a principle of which act?
A
Computer Misuse Act 1990C
Data Protection Act 1984D
Privacy Protection Act 1980 41
Placing computers and backing storage devices in locked rooms is a measure against what?
C
Unauthorized physical access 42
According to data protection principles, for how long should an organization keep personal data?
C
No longer than is necessary for its purposeD
As long as the user is alive 43
The act that prevents the government from comparing certain records to find a match is the...?
A
Video Privacy Protection Act of 1988B
Computer Security Act of 1987C
Computer Matching and Privacy Protection Act of 1988D
Computer Misuse Act 1990 44
What is the term for making illegal copies of copyrighted software?
45
What is the actual problem in the loss of data for transaction-based systems?
A
Difficulty in recovering it in timeB
Insurance does not cover itC
The hardware is expensiveD
The software is hard to find 46
A virus can make network resources unavailable by...?
B
Encrypting all data on the serverC
Copying itself to all computers and sending data constantlyD
Shutting down the network switch 47
What is the second solution for preventing unintentional data modification by authorized users?
B
Periodic backup of dataC
Changing passwords weekly 48
To ensure privacy, an organization collecting data should only collect data that is...?
A
Interesting for researchC
Adequate and necessary for its working 49
An individual must be informed about the identity of the organization and the purpose of data collection. This is a principle of what?
50
The Computer Misuse Act 1990 recognizes 'Unauthorized access with intent to commit or facilitate commission of further offences' as a key...?