Professional Documents
Culture Documents
• Self-duplicating.
• Spread fast.
• Active.
• All of them correct.
• Destroy.
• Destruction
• Desturbed.
• Non of them.
• Open.
• Turned off.
• Both are correct.
• Both are false.
• Opreating system.
• Files.
• Both are correct
5-Viruses have diffrenet ways to infect the computer. All the following is correct except:
• Infected.
• Infect.
• Infectious.
• Non of them.
• Hackers.
• Worm.
• Crime tools.
• Piracy.
9-Hakers are people who intentionally……..
• Creat viruses.
• Engage in software piracy.
• Deface website.
• All of them correct.
10-One of the crime tools that tries millions of combination of characters is……
• Vulnerability.
• Password guessers.
• Automatic computer virus generatoe.
11-Vulnerability means:
• Software strength.
• Software weakness.
• Viruses generator.
• Hakers.
• Exports.
• Programmer.
• All of them.
• Viruses.
• Worms.
• Both.
• Non.
• Password guessers.
• Vulnerability.
• All of them.
• Computer services saturator.
• Hardware.
• Software
• . Programs
• .All of them.
•
•
*true or false.
8-worms and viruses exist and can slowly contaminate millions of computer.
14-when the viruse spread across computer network, it does not infect other shared drives.
15-viruses and worms are easy to deal whit, so you do not need to be worried if they exist in your computer.