2. 1.when the Indian parliament passed the IT Act
A. 1990
B. 1992
C. 2000
D. 2005
2.what is called protecting data from online attacks,
deletions, malware
A. Physical security
B. Cyber security
C. Cyber attack
D. Virus
3.what is called the unauthorized control /access
over the computer system and destroys data
A. Defamation
B. Carding
C. Hacking
D. Cyber stalking
3. 4.cyber security is also called as…………..security
A. Criminal
B. Information technology
C. National
D. International
5.Which of the following is an antivirus program
A. Wortron
B. K7
C. Quick heal
D. All of these
6…………… monitors users activity on internet and
transmit that information in the background to
someone else
A.Malware
B.Spyware
C.Adware
D. None of these
4. 7.It is a program or hardware device that filters the
information coming through an Internet connection
to a network or computer system
A. Anti-virus
B. Cookies
C. Firewall
D. Cyber security
8.Passwords are used to improve the..........of a
network
A. Performance
B. Reliability
C. Security
D. Longevity
9.Where might a spammer get your personal
information from
A. Facebook
B. MySpace
C. LinkedIn
5. D. All of the above
10…………… allow a visited website to store its own
information about user on the user’s computer
A.Spam
B.Cookies
C.Malware
D. Adware
11.Which of the following is a class of computers
threat
A. Phishing
B. Soliciting
C. DoS attack
D. Stalking
12.Unsolicited commercial email is known as……
A. Spam
B. Malware
C. Virus
D. Spyware