_40. A computer worm that can create a backdoor in the victim computer's operating system.
a. Storm worm
b. LEAP Virus
c. My doom
d. SQL Slammers
41. The use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users'
computers.
a. Spyware
b. Cryptojacking c. Malvertising
d. Ransomware
42. A computer virus to hit the Internet in 2001.
a. NIMDA
b. LEA P
c. My doom
d. Sapphire
43. Yottabyte is equals to?
a. 1024 ZB
b. 1024 MB
c. 1024TB
d. 1024 PB
44. A virus that marked a new direction for computer viruses, setting the bar high for those that
would follow.
a. KLEZ
b. Sapphire
c. NIMDA
d. My doom
-45. A malware used for the purpose of secretly gathering data on an unsuspecting user.
a. Spyware
b. Worm
c. Trojan.
d. DOOM
_46. A flavor of malware that encrypts your hard drive's files and demands a payment.
a. Spyware
b. Worm
c. Doom
d. Ransomware
47. A program that cannot reproduce itself but masquerades as something the user wants and
tricks them into activating it so it can do its damage and spread
a. Worm
b. Trojan
c. My doom
d. Worm
48. A malware that can force you to supply them with Bitcoin.
a. Spyware
b. Cryptojacking c. Doom
d. Ransomware
49. The following are the Malware protection EXCEPT one,
a. Mccaffe
b. Windows defender c. Bit defender d. Avast
50. What is the element of graphical user interface that appears on the display screen and that
you move to select objects in the command?
a. Menu
b. Desktop
c. Pointer d. Windows​





PLWASE YUNG TAMA NAMAN SANA

Answers & Comments


Add an Answer


Please enter comments
Please enter your name.
Please enter the correct email address.
You must agree before submitting.

Helpful Social

Copyright © 2024 EHUB.TIPS team's - All rights reserved.