What does malware stand for?
a) multi-ware
b) malicious software
c) module-ware
d) none of these
The process of verifying the identity of user is called…..
a) authorization
b) authentication
c) verification
d) all of these
Which of the following are authentication methodologies?
a) password
b) PIN
c) access card
d) all of these
The process of verifying the rights of user to access computer
resource is called…..
a) authorization
b) authentication
c) verification
d) all of these
What does PIN stand for?
a) personal integer number
b) personal identification number
c) personal infinite number
d) personal implicit number
How many causes of computer viruses?
a) three
b) four
c) five
d) six
Infected flash drive, email attachment, Insecure Websites, Networks, Pirated Software’s