ONLINE ACCESS AND COMPUTER SECURITY
Short Answer Type
Questions Q.1 What is a virus? What is anti-virus software?
Ans: A computer virus is a
malicious program that self-replicates by copying itself to another program. In
other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable
systems, gain admin control and steal user sensitive data. Hackers design
computer viruses with malicious intent and prey on online users by tricking
them.
Antivirus software is a program or
set of programs that are designed to prevent, search for, detect, and remove
software viruses, and other malicious software like worms, trojans, adware, and
more
Q.2 How
is backup utility useful? Is it necessary to take backup of data?
Ans: Backup is a very helpful utility. You can backup your data
with that and whenever your data is corrupted by any virus or Trojans your data
will remain safe.
It is not necessary to backup your until
or unless you have something really important stuff in your machine.The backup
depends on your wish if you want to make backup, go on for it and if you don't
leave it. But if you have something very useful for you in future then its better
to take backup.
Q.3
What is Computer virus? How can it affect your computer?
Ans: A computer virus is a
malicious program that self-replicates by copying itself to another program. In
other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable
systems, gain admin control and steal user sensitive data. Hackers design
computer viruses with malicious intent and prey on online users by tricking
them.
Q.4 What are different types of threats to
computer security?
Ans: A Threat is a potential violation of security. When a threat
is actually executed, it becomes attack. Those who execute such actions, or
cause them to be executed are called attackers.
Some common threats the average
computer user faces everyday are
1.
Viruses
2.
Worms
3.
Trojans
4.
Spyware
5.
Adware
6.
Spamming
7.
PC Intrusion:
8.
Denial of Service
9.
Sweeping
10. Password
Guessing
11. Phishing
Q.5
What type damages can be caused by viruses to your computer?
Ans: Damages caused by
Viruses:
– Damage or
Delete files.
– Slow down
your computer.
– Invade your
email programs.
Q.6
What are
malware? What type damages can they cause to your computer?
Ans: "Malware" is short for malicious software and used
as a single term to refer to virus, spy ware, worm etc. Malware is designed to
cause damage to a stand-alone computer or a networked pc. So wherever a malware
term is used it means a program which is designed to damage your computer it
may be a virus, worm or Trojan.
Q.7
What is a
spam? Why has it become a big Internet issue?
Ans: Spam email is a form of commercial
advertising which is economically viable because email is a very cost-effective
medium for the sender. If just a fraction of the recipients of a spam message
purchase the advertised product, the spammers are making money and the spam
problem is perpetuated.
Q.8
What do you
understand by PC intrusion?
Ans: Intrusion -
Computer Definition. To compromise a computer system by breaking the security
of such a system or causing it to enter into an insecure state. The act of
intruding—or gaining unauthorized access to a system—typically leaves traces
that can be discovered by intrusion detection systems.
Q.9
What
measures would you take to avoid -
(a)Virus attack (b) Spyware (c) Adware (d) Spam (e) PC Intrusion
Ans: (a), (b)&
(c) (d)
(e)
Q.10
What are
denial-of-service or Sweeper attack?
Ans: A denial-of-service attack
is a security event that occurs when an attacker prevents legitimate users from
accessing specific computer systems, devices, services or other IT resources.
Q.11
What is
Phishing?
Ans:
Q.12
How is
pharming similar to and different from phishing?
Ans:
Q.13
What is
Authentication and Authorization? Why are these two used together?
Ans: Difference between Authentication
and Authorization. Both the terms are often used in conjunction with each other
in terms of security, especially when it comes to gaining access to the system.
Authentication means confirming your own identity, while authorization means
granting access to the system.
Q.14
What is the
significance of Firewall in a computer‟s security scheme?
Ans:
Q.15
What is
Eavesdropping? What security measures can you take up to prevent it?
Ans:
Q.16
What is the
need for secure passwords?
Ans: A password that is difficult to
detect by both humans and computer programs, effectively protecting data from
unauthorized access. A strong password consists of at least six characters (and the more characters,
the stronger the password) that are a combination of letters, numbers and
symbols (@, #, $, %, etc.) if allowed. Passwords are typically casesensitive,
so a strong password contains letters in both uppercase and lowercase. Strong
passwords also do not contain words that can be found in a dictionary
0 comments:
Post a Comment
Thanks for leaving a comment. As soon as it's approved, it will appear.