Q: 161
The computer abbreviation KB usually means____________?
-
Key Block
-
Kernel Boot
-
-
Kit Bit
Q: 162
The typical computer criminal is a(n)____________?
-
Young hacker.
-
Trusted employee with no criminal record.
-
Trusted employee with a long, but unknown criminal record.
-
Overseas young cracker.
Q: 163
The common name for the crime of stealing passwords is____________?
-
Jacking.
-
Identity theft.
-
-
Hacking.
Q: 164
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
-
Spooling.
-
-
Spoofing.
-
Hacking.
Q: 165
Malicious software is known as____________?
-
Badware.
-
-
Maliciousware.
-
Illegalware
Q: 166
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
-
Worm.
-
-
Virus.
-
Macro virus
Q: 167
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
-
Trojan horse.
-
-
Time bomb.
-
Time-related bomb sequence.
Q: 168
In 1999, the Melissa virus was a widely publicised:____________?
-
-
Macro virus.
-
Trojan horse.
-
Time bomb.
Q: 169
What type of virus uses computer hosts to reproduce itself?
-
Time bomb
-
-
Melissa virus
-
Macro virus
Q: 170
The thing that eventually terminates a worm virus is a lack of:
-
-
Time.
-
CD drives space.
-
CD-RW.
Q: 171
When a logic bomb is activated by a time-related event, it is known as a____________?
-
Time-related bomb sequence.
-
Virus.
-
-
Trojan horse.
Q: 172
What is the name of an application program that gathers user information and sends it to someone through the Internet?
-
A virus
-
-
Logic bomb
-
Security patch
Q: 173
Which banned outfit';s group was destroyed by Pak Army in 3-day Mastung operation, which was carried out from June 1 to 3 -; 2017?
-
Lashkar-e-Taiba
-
Lashkar-i-Jhangvi Al-Almi
-
Tehreek-e-Taliban Pakistan
-
None of these
Q: 174
Shanghai Cooperation Organisation SCO 17th summit was held in ____________?
-
Shanghai, China
-
Tashkent, Uzbekistan
-
-
Moscow, Russia
Q: 175
Pakistan was an observer at the SCO since__________?
-
2002
-
2003
-
2004
-
Q: 176
Which two countries become full members of Shanghai Cooperation Organisation during the 17th SCO summit held in June 2017?
-
-
Afghanistan and Iran
-
India and Mongolia
-
Pakistan and Afghanistan
Q: 177
____________is the measurement of things such as fingerprints and retinal scans used for security access?
-
-
Bio measurement
-
Computer security
-
Smart weapon machinery
Q: 178
What is the most common tool used to restrict access to a computer system?
-
User logins
-
-
Computer keys
-
Access-control software
Q: 179
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
-
Hacker-proof program
-
-
Hacker-resistant server
-
Encryption safe wall
Q: 180
The scrambling of code is known as___________?
-
-
a firewall
-
Scrambling
-
Password proofing