Professional Documents
Culture Documents
COMP-IX-2nd Ass
COMP-IX-2nd Ass
Q.01: Choose the correct answer for each from the given options. 12
ii. The authentication mechanism that only allows the real person to access data or device is:
(a) Password (b) PIN (c) Biometric (d) Scan Code
iv. Since it does not harm or steal data, the least harmful malware is:
(a) Virus (b) Adware (c) Spyware (d) Trojan
v. The malware that replicates itself and doesn't need to attach with any files is:
(a) Virus (b) Adware (c) Spyware (d) Worm
vii. "Click this link and win a $5 voucher at McDonald's". This is an example of:
(a) Scam (b) Phishing (c) Click jacking (d) Hacking
xi. The topology in which all computers are connected to a central device called hub is:
(a) Bus (b) Star (c) Ring (d) Tree