مندرجہ ذیل میں سے کون سا آپشن کمپیوٹر سیکیورٹی کے لئے سب سے سنگین خطرہ ہے؟
A. None of these
B. Trap door
C. Trojan horse
D. Viruses
Explanation
A Trap door (or backdoor) is a hidden entry point into a system that bypasses normal authentication, making it a serious security threat .
Unlike viruses or worms , it allows unauthorized access without detection, potentially exposing entire systems.
Show/Hide Explanation
مندرجہ ذیل میں سے کون سا اینٹی وائرس سافٹ ویئر کی قسم نہیں ہے؟
A. Avast
B. Chrome
C. McAfee
D. Norton
Explanation
Chrome is a web browser, not antivirus software.
Norton, McAfee, and Avast are all well-known antivirus programs used to detect and remove malware.
Show/Hide Explanation
عام طور پر بوٹ سیکٹر وائرس عام طور پر _____ کے ساتھ منسلک ہوتا ہے؟
A. .obj files
B. None of these
C. .exe files
D. WinZip files
Explanation
Boot sector viruses often spread through .exe files , which are executable and can run malicious code when opened.
These files can infect the boot sector when the system starts , making them a common carrier for such viruses.
Show/Hide Explanation
ڈی او ایس ڈسک سے کوئی ڈیٹا بازیافت نہیں کر سکتا اگر کمپیوٹر وائرس اس کے _____ کو کرپٹ کر دے؟
A. Data Area
B. Directory Area
C. BAT Files
D. File Allocation Table (FAT)
Explanation
If a computer virus corrupts the File Allocation Table (FAT) on a DOS system, the operating system will be unable to retrieve any data from the disk.
The FAT is a critical data structure that keeps track of the location of files on the disk , and if it becomes corrupted , the system will not be able to access the data.
Show/Hide Explanation
فائر والز کو کس سے بچانے کے لیے استعمال کیا جاتا ہے
A. data driven stacks
B. virus attacks
C. Fire attacks
D. unauthorized attacks
Explanation
A firewall i s a software or firmware that prevents unauthorized acces s to a network.
A firewall inspects incoming and outgoing traffi c using a set of rules to identify and block threats.
****
Show/Hide Explanation
اینٹی وائرس سافٹ ویئر کا مقصد کیا ہے؟
A. Mange Files
B. Protect against Malware and Virus
C. Enhance System Performance
D. Backup Data
Explanation
Anti-virus software primarily serves to protect against malware and viruses
Its main functions include:
Detecting and Removing Threats Real-Time Protection Preventing Future Infections:
Show/Hide Explanation
A. computer
B. program code
C. computer name
D. Application software
Explanation
An antivirus is an: Application software
Antivirus is an example of: security
Show/Hide Explanation
وائرس، ٹروجن ہارس اور کیڑے ______ ہیں؟
A. User-friendly applications
B. Harmless application resident on computer
C. Able to harm computer system
D. None of these
Explanation
Viruses, Trojan horses, and worms are malicious software used to harm a computer system. A Trojan Horse is a program that allows the attacker to control the user's computer from a remote location. Additional Information
The list below shows some of the activities that the attacker can perform using a Trojan horse: Electronic money theft . Modifying files on the user’s computerDamage the user’s computer (crashing, blue screen of death, etc.) Stealing sensitive data such as stored passwords, credit card information, etc.A worm is a malicious computer program that replicates itself usually over a computer network. A virus is a computer program that attaches itself to legitimate programs and files without the user's consent. A computer virus may be used to; Access private data such as user id and passwords. Display annoying messages to the user. Corrupt data on your computer. Log the user’s keystrokes.
Show/Hide Explanation
وائرس کس کے ذریعے پھیلتا ہے
A. CD-ROD
B. All of these
C. Computer network
D. Floppy disk
Explanation
Trojans spreads through a computer network.
Boot Sector Virus spreads floppy disk.
AGM 08-2-2023
Show/Hide Explanation
A. are people who are allergic to computers
B. legally break into computer as long they
C. Break into someone else computer
D. are another name of users
Explanation
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0