Page 120 - Computer - 7
P. 120

  Mobile malware is malicious software specifically designed to target mobile devices, such as
                smartphones and tablets, with the goal of gaining access to private data.
              Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known
                as SMS phishing.
              Hacking is an unauthorised illegal activity to gain access to computers and network resources.

              Virus Definition is the database of viruses and other malware that an antivirus software uses to
                scan a computer.



                                                  INFO RETENTION
                                                  INFO RETENTION


          A.   Select the correct option for each of the following statements.

              1.  A utility software designed to protect the computer from malware is ______.
                  (a)  Antivirus software                           (b)  Antimalware software
                  (c)  Antiworms software                           (d)  Antiattack software

              2.  A virus that infects program files in a computer is ______.
                  (a)  Multipartite Virus  (b)  Macro Virus         (c)  Software Virus     (d)  Program virus

              3.  A virus designed to avoid detection by antivirus software is ______.
                  (a)  Stealth Virus       (b)  Boot Sector Virus  (c)  Polymorphic Virus (d)  Trojan horse

              4.  Unsolicited and unwanted email usually sent by companies to advertise and sell their products
                  is called ______.
                  (a)  Spyware             (b)  Spam                (c)  Adware             (d)  Junk

              5.  The act of stealing a user’s online identity to send messages and email from his online profile is
                  called ______.
                  (a)  Identity theft      (b)  Data theft          (c)  Phishing           (d)  Vishing
          B.  Fill in the blanks with the correct answer.

              1.  Melissa, Relax, Concept, and Nuclear are some examples of _________.
              2.  _________ is the unauthorised illegal activity to gain access to computers and network resources.

              3.  _________ is the database of viruses and other malware that an antivirus software uses to scan
                  a computer.

              4.  Beast, DarkComet, and Zeus are some examples of _________.
              5.  _________ is the unauthorised act of copying or transferring private data that belongs to an
                  organisation or an individual, without their consent.

          C.   Write ‘T’ for True and ‘F’ for False statement.
              1.  A polymorphic virus only infects boot record program in a hard disk.                       _______
              2.  You should always open email attachments after scanning them.                              _______



              118
   115   116   117   118   119   120   121   122   123   124   125