Contents

A transaction log is an example of which form of data security?
a) scanning                          
b) firewall
c) internet controls
d) lock


c

A set combination of software and hardware that prevent unauthorized access
a) scanning                          
b) firewall
c) internet controls              
d) lock


b

The virus known for wiping out the entire contents of a computer’s hard disk was called…
a) Jerusalem                        
b) Melissa
c) Michelangelo 
d) Cascade


c

The virus that infects MS word macros and emails attached copies of the macros to outlook email recipients is called……
a) Jerusalem                        
b) Melissa
c) Michelangelo  
d) Cascade


b

The virus attached itself to operating system and drop text letters to the bottom of screen is called
a) Jerusalem                        
b) Melissa
c) Michelangelo  
d) Cascade


d

The virus that activates itself every Friday the 13th and erases program files from the disk is called……
a) Jerusalem                       
b) Melissa
c) Michelangelo  
d) Cascade


a