Security Copyright and The Law - Short Questions

 

Security Copyright and The Law - Short Questions. Following are the important and more conceptual short questions with answers of Computer, ICS Part-I, Chapter No.6: Security Copyright & The Law, for the interview and final examinations:


ics part 1 security copyright and the law short questions, information security, data security, cyber security


Chapter No.6
Security Copyright & The Law

Short Questions & Answers


Q.1: Define security of data?

Answer:

Security of data is a system of safeguards designed to protect a computer system and data from intentional and accidental damage or access by unauthorized persons.

 

Q.2: What is the use of biometrics for data security?

Answer:

In this approach, biometrics means, such as fingerprints, voice recognition, and eye-retina are used to identify a user for data security.

 

Q.3: Write the four approaches used for data security?

Answer:

The following four approaches to data security are:

What You Have: Unauthorized access is prevented by providing a key, badge, token or plastic card to authorized users.

What You Know: Authorized users are given a user-id and a password. Only those persons who know the password can access the system.

What You Do: Authorized users are asked to sign a document before allowing access to a computer system.

What You Are: Some data security measures are biometrics. Biological means of identification i.e. fingerprints, voice recognition, and eye retina etc.

 

Q.4: What is a computer virus?

Answer:

A virus is a program that attaches itself with other executable files by modifying them so that the virus program is also loaded and executed with the execution of these programs. A virus usually performs destructive operation by deleting or modifying data.

 

Q.5: What are the major causes of viruses?

Answer:

The following are the major causes of viruses:

  • Email
  • Internet
  • Computer Network
  • Removable storage media
  • Pirated software

 

Q.6: Define the virus cause “Removable Storage Media”?

Answer:

The most common cause of virus spread is use of removable storage media, such as floppy disc, CDs and flash devices. When a virus-infected file is copied from one computer to another through a removable storage media, the virus is also transferred.

 

Q.7: Define the virus cause “Pirated Software”?

Answer:

Installing pirated or unlicensed software is also a common cause of virus infection. Someone may intentionally include some code in the software such that the code activates only when the software does not find some special information, like a license key.

 

Q.8: Define boot sector?

Answer:

The disk is divided into tracks and sectors. The disk, on which the operating system has been loaded, has a special program in its first sector called the boot sector. When the computer is turned on, the program in the boot sector is automatically loaded into the memory.

 

Q.9: What is Boot Sector virus?

Answer:

The boot sector virus modifies the program in the boot sector and is loaded into memory whenever the computer is turned on. From memory the boot virus spreads to every disk that the system reads. The virus is attached with the executable file i.e., .exe, .com, and .dll files.

 

Q.10: What is Chernobyl virus?

Answer:

The Chernobyl virus deletes all the Microsoft Office files and also the partition information from the disk, hence causing a major loss of data.

 

Q.11: What is Logic Bomb?

Answer:

A logic bomb is programming code that is designed to execute under circumstances. It is set to go off at a certain data and time. A logic bomb, when exploded may display or print a message, delete or corrupt data, or have other undesirable effects.

 

Q.12: What is a Trojan horse?

Answer:

The Trojan horse places illegal, destructive instructions in the middle of a legitimate program, such as a computer game. Once you run the program, the Trojan horse goes to work, doing its damage while you are blissfully unaware. FormatC is an example of Trojan horse.

 

Q.13: Define Redlof virus?

Answer:

Redlof is a polymorphic, VB script virus. It infects .html, .htm, .asp, .php, .jsp, and .vbs files on all drives. The virus copies itself to Windows system files. It changes the default association for .dll files.

 

Q.14: What is a Macro virus?

Answer:

A virus written in a programming language and embedded inside another document, such as a word processor document or spreadsheet document is called a macro virus.

 

Q.15: What Worms?

Answer:

Worms copy themselves from computer to computer rather than from file to file. Because they require no human action to do so, they can spread much more rapidly than regular computer viruses. They usually generate excessive e-mails and cause e-mail servers to crash.

 

Q.16: What is antivirus software?

Answer:

Antivirus software are special programs that detect and remove viruses from the computer. These not only clean viruses from infected files and disks, they can also prevent new viruses from getting to the computer. The common used anti-virus programs are:

  • Norton antivirus program
  • MacAfee antivirus program
  • Dr. Solomon antivirus program
  • Avast antivirus program
  • AVG antivirus program

 

Q.17: How to safeguard against viruses?

Answer:

The following are the few ways through which you can save your computers from getting infected by a virus:

  • Never open unknown email message, and also scan all email messages
  • Minimize the use of removable storage media
  • Don’t download freeware programs without first checking it for virus
  • Always use antivirus program to detect and to delete viruses
  • Update antivirus program periodically to detect new viruses
  • Keep backup of your data; it will be useful if virus deletes your data

 

Q.18: Who is Cracker or Hacker?

Answer:

A person who gains access to a computer system illegally is called a cracker or hacker. Hackers normally break into a computer system to use or steal computer resources or corrupt a computer’s data.

 

Q.19: Write the benefits of password?

Answer:

Authorized users are given a user-id and a password. A password must be entered to get access to the system. Only those persons who know the password can access the system.

 

Q.20: How data security may be violated?

Answer:

The following are some ways in which security of data may be violated:

  • Hardware Theft
  • Unauthorized Access
  •  Information Theft
  • Attacks of Viruses and Worms

 

Q.21: How to counteract data security threats?

Answer:

The following practices will help prevent the most common threats:

  • Keep backups
  • Update software periodically
  • Ensure physical security
  • Educate users about data security threats
  • Assign proper rights to users to access data

 

Q.22: What is privacy issue?

Answer:

Privacy is the right of a person to keep his/her personal information away from other people. If a computer system holds such information then it is the right of the person that this information is not used or given to anyone without his/her permission.

 

Q.23: Define data protection?

Answer:

Data protection rules define that any personal data kept by an organization should never be disclosed to unauthorized persons/organization under any circumstances.

 

Q.24: What is data protection legislation?

Answer:

It defines the laws that ensure data protection. Many countries have defined the data protection legislation and in some advanced western countries; this law is enforced properly as well.  

 

Q.25: What is copyright?

Answer:

Copyright is the exclusive right to use a creative work or allow someone else to do so. It allows the creator to benefit from his work. It also gives the creator control on the manner in which his work is used.

 

 Security Copyright & The Law - MCQs

Post a Comment

Your feedback is highly appreciated and will help us to improve. So, please give your good suggestions.

Previous Post Next Post