A. A computer virus
B. A program that catalogs Web sites
C. A hacker who breaks into computer systems
D. An application for viewing web pages
4 The circuit used to store one bit of data is known as
D. Flip Flop
5 Copyright law protects
A. Tangible property
B. Intangible property
C. The name of a particular good or service
D. Ideas contained in varied forms of expression
8 Which is NOT a good Web security strategy?
A. Restrict access to the Web server; keep a minimum number of ports open
B. Limit the users who can load software, edit or add files.
C. Add demo programs, so users can test system without accessing production data.
D. Remove unnecessary compilers and interpreters.
11 Which of the following is NOT considered to be malware?
12 A passive threat to computer security is
A. Malicious Intent
C. Accident Errors
D. Espionage Agents
14 The topology with highest reliability is?
A. Bus topology
B. Star topology
C. Ring Topology
D. Mesh Topology
15 What is a good way to protect sensitive information sent via e-mail?
A. Write it in another language
B. Keep the message in attachment
C. Encrypt the message
D. Send as a blind copy
O level Exam is an online learning platform that helps O level Students to achieve their personal and professional goals.