Page 79 - 2501_KVS_C-7
P. 79

4.   Give one difference between Trojan horse and Worm.

                        5.   Why we need backup?

                  B.    Fill in the Blanks.

                        1.   IT ACT, 2000 notified on ________________.

                        2.   ________________ includes sending, posting, or sharing negative, harmful, false,
                             or mean content about someone else.

                        3.   ________________ destroy data by gaining an unauthorised access to the network.

                        4.   ________________ is a set of moral principles that regulate the use of computers.

                        5.     Packet Filter looks at each ________________ entering or leaving the network.

                  C.    Match the Following:

                                       A                                    B

                        1.   Backup and Restore                   a.    Fake website

                        2.   Identity theft                       b.    Unauthorised access

                        3.   Norton                               c.    Credit card information

                        4.   Firewall                             d.    Update & Security

                        5.   Pharming                             e.    Antivirus

                  D.    State whether these statements are true or false.

                        1.   Crackers are good people.                                            ____________

                        2.     Ransomware demand a large sum of money for you to then get
                             your data back.                                                      ____________

                        3.   Proxy Server hides the true network addresses.                       ____________

                        4.   Spyware is self-replicating viruses.                                 ____________

                        5.   Firewall is only a hardware device.





                            Something to Do


                   1.    Go to lab and find the Antivirus installed in your computer lab.
                   2.    Take the backup of your file and then restore it.









                                                                             Computer Security                      77
   74   75   76   77   78   79   80   81   82   83   84