Professional Documents
Culture Documents
o Backdoors
o Troy
o Virus
o worm
2)To restrict visiting Internet sites,you can modify the setting of your
o Operating system
o ISP
o Web browser
o Modem
o Letters only
o Numbers only
o Letters in caps and small forms
o Letters,numbers and special characters
o Beatle Juices
o Lms#456JKZX8
o 13Locksmith
o JamesBrown
8)What are the three most common risk associated with “surfing the Web(select 3 answer)
o Backdoors
o Keylogging
o Time bomb
o Social Engineering
12)Which of the following option would you choose to secure e-mail messages?
o Digital signature
o Digital voice
o Digital autograph
o Digital photograph
18)What should you do if you receive a call from someone in your computer support department
asking for your password?
19)Working away from the office gives you are more freedom to disregard your company’s security
standards and policies.(True or False)
o True
o False
o Ctrl+shift+del
o [windows key]+L
o Alt+shift+Del
o Alt+shift+ctrl
21)To verify if your are on a secure page, you will check for
o FTP sites
o HTTPS sites
o Share you root drive
o PQP network
24)This tool can capture password when types from the keyboard
o Eavesdropper
o Keylocker
o Enterapper
o Keylogger
26)Which of the following statements are wrong in the context of “downloading” files?
28)Which command displays all Current TCP/IP network configuration values?(select 2 answer)
o IPconfig
o Netstat
o Ping
o Netconfig
29)While using peer to peer networks which of the following precautions should you use??
o Encryption involves protecting a file by hiding them into another file or message so that only
authorized users can access the file
o Authenticity of all files downloaded from third party sources cannot be trusted
o File integrity can be checked by using MD5 check sum
o All application can be identified by using a task manager
33)If you had secure a folder completely, which option will you choose?
34)While using peer to peer networks which of the following precautions would you use?