In the realm of computer systems, what is the term for the process that rigorously verifies the identity of a user attempting to access resources?
💡 Explanation
Authentication is the process of confirming a user's identity, distinct from authorization which grants permissions.
In the context of computer systems, NORTON is primarily recognized as a type of:
💡 Explanation
Norton is a well-known brand of software designed to protect computer systems from malicious threats.
Electronic crime, which involves the use of computers and networks to commit illegal acts, is most accurately categorized as a form of:
💡 Explanation
Electronic crime is a broad term encompassed by the more specific and widely recognized category of Cyber Crime.
In the realm of computer security, which fundamental process involves transforming a message into a secret code to render it unintelligible to unauthorized parties?
💡 Explanation
Encryption is the process of encoding information so that only authorized parties can understand it.
Which of the following terms best describes attempts by individuals to obtain confidential information by falsely representing their identity?
💡 Explanation
Phishing specifically involves deception to acquire sensitive data by impersonating a trustworthy entity.
Which of the following malware types is frequently disguised as a legitimate software application to deceive users?
💡 Explanation
A Trojan Horse is a type of malware that masquerades as legitimate software to gain unauthorized access to a system.
In the context of computer security, which type of virus is characterized by its ability to permanently reside in the Random Access Memory (RAM) of an infected system, allowing it to infect other files and programs?
💡 Explanation
A resident virus remains in RAM, enabling it to continuously monitor and infect other processes.
In the realm of computer communication, what fundamental process is referred to as 'Verification'?
💡 Explanation
Verification in computer communication confirms the identity of the sender or receiver, which is the core function of authentication.
Which of the following categories best describes a program designed to detect and remove malicious software from a computer system?
💡 Explanation
Antivirus software is specifically designed to protect against malicious software, fitting the description of identifying and removing threats.
Which of the following best defines Cyber Warfare?
💡 Explanation
Cyber warfare involves the strategic use of technology to attack or disrupt computer systems and networks, aligning with the domain of cybersecurity.
Which type of malicious software is designed to infiltrate and damage computer systems?
💡 Explanation
A virus is a type of malicious software designed to replicate itself and cause harm to computer systems.
A computer virus can render a hard disk completely unusable by corrupting which of the following critical components?
💡 Explanation
The File Allocation Table (FAT) is a crucial index that organizes data on a hard disk; its corruption makes data inaccessible.
In the context of computer systems, what is the primary function of a password?
💡 Explanation
A password is a security measure used to authenticate a user and grant them access to a system.
Which component is primarily utilized in a computer system to safeguard a network server from unauthorized access and potential damage by individuals logging into it?
💡 Explanation
Modems are crucial for establishing secure network connections and can incorporate security features to protect servers.
Which of the following is a primary method for reducing the risk of unauthorized computer system access when connected to the internet?
💡 Explanation
Virus scanning helps detect and remove malicious software that could lead to unauthorized access.
Which of the following is NOT a primary purpose of antivirus software?
💡 Explanation
Antivirus programs are designed to protect against malware, not to report specific virus names to external entities like Microsoft.
Which category of software is designed to secretly monitor and collect information about a user's online computer activities without their explicit consent?
💡 Explanation
Spyware is specifically designed to monitor user activities and is a type of malicious software.
In the context of computer systems, what is the primary purpose of a data backup?
💡 Explanation
Data backup is a security measure to prevent data loss by creating copies.
In the context of computer systems, the process of converting data into a code to prevent unauthorized access during its transmission or storage is known as:
💡 Explanation
Encryption is the process of scrambling data to make it unreadable to unauthorized parties, a crucial aspect of data security.
In Pakistan, the first national helpline dedicated to addressing cyber harassment was established in which year?
💡 Explanation
The national cyber harassment helpline was launched in December 2016, marking a significant step in digital safety.
Which of the following is NOT a common vector for virus transmission in a computer system?
💡 Explanation
While e-mail attachments can carry viruses, unsolicited e-mail messages themselves are not a direct source of virus infection without user interaction.
Which key combination is commonly used in operating systems to lock the computer's keyboard, preventing unauthorized access?
💡 Explanation
The Ctrl+Alt+Del key combination is a standard security measure to access options like locking the computer.
In the context of computer systems, authentication primarily refers to the process of verifying a user's identity, typically by requiring them to provide a unique combination of:
💡 Explanation
Authentication is the mechanism by which a system confirms that a user is who they claim to be, most commonly through credentials like a username and password.
A computer virus that corrupts which specific component of a disk's file system would prevent the Disk Operating System (DOS) from retrieving any data?
💡 Explanation
The File Allocation Table (FAT) is crucial for tracking the location of files on a disk, and its corruption by a virus would indeed make data retrieval impossible for DOS.
Which of the following best describes the primary function of a firewall in a computer system?
💡 Explanation
A firewall acts as a barrier to block malicious traffic and unauthorized connections, thereby securing the computer.
Which of the following activities represents a malicious intrusion into computer systems or networks with the intent to steal data, disrupt operations, or cause damage?
💡 Explanation
Hacking is the unauthorized access to computer systems and data, a core characteristic of cybercrime.
What is the general term used to describe crimes that are committed using computers and the internet?
💡 Explanation
Cybercrime is the umbrella term for illegal activities conducted through digital devices and networks.
Which of the following is NOT a common example of a real security or privacy risk in the digital realm?
💡 Explanation
Spam, while often annoying, is generally not considered a direct security or privacy risk in the same way as phishing, malware, or data breaches.
To safeguard a computer system against malicious software like viruses, what type of protective program should be installed?
💡 Explanation
Antivirus software is specifically designed to detect, prevent, and remove malicious software, including viruses, from a computer.
Following the initial system startup and before the Graphical User Interface (GUI) becomes fully operational, which critical process typically initiates the user interaction phase?
💡 Explanation
Authentication is the security process that verifies a user's identity after the system has loaded necessary components and before full access to the GUI is granted.