9th Computer Science Chapter6 Computer Security and Ethics
Sr # | Questions | A | B | C | D |
---|---|---|---|---|---|
1 | What is intellectual property in the context of computer ethics? | The physical hardware components of a computer system | The legal rights to creative works, such as software, music, and writings, produced by individuals or companies | The process of protecting computer systems from unauthorized access | The ethical guidelines for computer programmers and developers | 2 | How do computer viruses typically spread from one computer to another? | Through physical contact with infected hardware | Through infected email attachments, malicious websites, or USB drives | Through overheating of computer components | Through electromagnetic interference | 3 | What is the primary goal of computer security? | To prevent any unauthorized access to computer systems | To make computer systems faster | To maximize network bandwidth | To eliminate the need for passwords | 4 | What does privacy in computer ethics refer to? | The protection of personal information from unauthorized access or disclosure | The ability to access computer resources without restriction | The speed at which data can be transmitted over a network | The process of securing computer systems from malware attacks | 5 | Which of the following is an example of multimodal authentication? | Using a fingerprint and a password to unlock a device | Using the same password for different accounts | Using multiple devices to generate a one-time password | Using a single authentication server for all users | 6 | Unauthorized access refers to: | Access granted to users with proper credentials | Access denied to users without proper credentials | Access granted to users without proper credentials | Access denied to users with proper credentials | 7 | Which type of malware is designed to spread from one computer to another by attaching itself to executable files? | Virus | Worm | Trojan horse | Spyware | 8 | What is a common method used by worms to spread across networks? | Attaching themselves to executable files | Exploiting vulnerabilities in software to self-replicate and spread automatically | Hiding within legitimate programs and waiting for specific conditions to execute | Monitoring and collecting user information without their knowledge | 9 | What is the primary characteristic of a worm? | It replicates itself and spreads across networks without human intervention. | It attaches itself to executable files and spreads when the files are executed. | It hides within other programs and waits for specific conditions to execute. | It monitors and collects user information without their knowledge. | 10 | Which of the following is an example of unethical behavior in computer use? | Keeping software licenses up-to-date | Sharing confidential information without permission | Sharing confidential information without permission | Following company policies regarding internet usage | 11 | What does computer crime involve? | Ethical use of computer resources in business environments | Unauthorized access to computer systems for beneficial purposes | Illegal activities conducted using computer technology, such as hacking, fraud, and identity theft | The ethical guidelines for computer scientists and engineers | 12 | Which precaution helps prevent malware infections when browsing the internet? | Disable firewall protection | Click on pop-up ads and suspicious links | Download files from unknown sources | Avoid visiting suspicious websites and clicking on suspicious links | 13 | Why is computer security important? | To increase the speed of data transmission | To ensure the confidentiality, integrity, and availability of data | To maximize the number of users accessing the network | To reduce the cost of maintaining computer systems | 14 | What is the best practice to protect a computer from malware? | Disable antivirus software | Download software from untrusted sources | Keep operating system and software up-to-date, use antivirus software, and exercise caution when browsing the internet or opening email attachments | Share passwords with friends and family | 15 | What is the purpose of antivirus software? | To spread malware | To detect and remove malware from computer systems | To increase computer performance | To encrypt data for secure transmission | 16 | What is the main difference between a hacker and a cracker? | Hackers have malicious intent, while crackers seek to improve security. | Hackers are skilled computer experts, while crackers are inexperienced. | Hackers exploit vulnerabilities for personal gain, while crackers do so for altruistic reasons. | Hackers are illegal, while crackers are legal. | 17 | Which term refers to an individual who gains unauthorized access to computer systems for malicious purposes? | Hacker | Cracker | Cybercriminal | Script kiddie | 18 | What is the advantage of biometric authentication over traditional password-based authentication? | Biometric authentication is less secure. | Biometric authentication requires less processing power. | Biometric authentication eliminates the need to remember passwords. | Biometric authentication is easier to implement. | 19 | What is the difference between authentication and authorization? | Authentication verifies the identity of a user, while authorization determines what actions the user is allowed to perform. | Authentication determines what actions the user is allowed to perform, while authorization verifies the identity of a user. | Authentication and authorization are synonymous and refer to the same process. | Authentication and authorization are unrelated to user access control. | 20 | Which of the following is a common symptom of a malware infection? | Improved computer performance | Increased storage space availability | Unexplained changes to system settings or files | Reduced internet speed | 21 | What does cyberbullying entail? | Ethical use of computer resources in educational settings | Unauthorized access to computer systems for malicious purposes | Harassment or intimidation of individuals using electronic communication, often through social media or online platforms | The ethical guidelines for conducting research using computer technology | 22 | What is a potential consequence of ransomware infection? | Increased computer performance | Loss of important data or files | Enhanced system security | Improved network speed | 23 | Which type of malware disguises itself as legitimate software? | Virus | Worm | Trojan horse | Spyware | 24 | What is multimodal authentication? | Authentication using multiple devices simultaneously | Authentication using multiple biometric factors | Authentication using multiple passwords | Authentication using multiple authentication servers | 25 | Which authentication method requires users to provide something they know, such as a password? | Biometric authentication | Two-factor authentication | Knowledge-based authentication | Token-based authentication | 26 | What does computer ethics primarily concern? | Ensuring computers operate efficiently | Preventing unauthorized access to computer systems | Guiding the moral conduct of individuals and organizations in computing-related activities | Maximizing profits from computer technology | 27 | What is malware? | Software that enhances computer security | Software that helps improve computer performance | Software designed to disrupt, damage, or gain unauthorized access to computer systems | Software that provides entertainment on computers |