Sie sind auf Seite 1von 3

have been infected with blocks of code thathe following refers to software desig

ned to harm your computer or computer security, engage in criminal activity, or


compromise resources in some way?
A. Adware
B. Malware
C. Systems Software
D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code that ca
n run automatically by themselves.
E. net of Boats.
Q15. Which of the following is a type of virus that hides inside other software,
usually an attachment or download?
A. A zombie
B. A worm
C. A Trojan horse
D. A botnet
E. Spyware
Q16. Which of the following refers to the forgiQ12. Which of the following refer
s to software designed to harm your computer or computer security, engage in cri
minal activity, or compromise resources in some way?
A. Adware
B. Malware
C. Systems Software
D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code that ca
n run automatically by themselves.
E. net of Boats.
Q15. Which of the following is a type of virus that hides inside other software,
usually an attachment or download?
A. A zombie
B. A worm
C. A Trojan horse

D. A botnet
E. Spyware
Q16. Which of the following refers to the forgiQ12. Which of the following refer
s to software designed to harm your computer or computer security, engage in cri
minal activity, or compromise resources in some way?
A. Adware
B. Malware
C. Systems Software
D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code thathe
following refers to software designed to harm your computer or computer security
, engage in criminal activity, or compromise resources in some way?
A. Adware
B. Malware
C. Systems Software
D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code that ca
n run automatically by themselves.
E. net of Boats.
Q15. Which of the following is a type of virus that hides inside other software,
usually an attachment or download?
A. A zombie
B. A worm
C. A Trojan horse
D. A botnet
E. Spyware
Q16. Which of the following refers to the forgiQ12. Which of the following refer
s to software designed to harm your computer or computer security, engage in cri
minal activity, or compromise resources in some way?
A. Adware
B. Malware
C. Systems Software

D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code that ca
n run automatically by themselves.
E. net of Boats.
Q15. Which of the following is a type of virus that hides inside other software,
usually an attachment or download?
A. A zombie
B. A worm
C. A Trojan horse
D. A botnet
E. Spyware
Q16. Which of the following refers to the forgiQ12. Which of the following refer
s to software designed to harm your computer or computer security, engage in cri
minal activity, or compromise resources in some way?
A. Adware
B. Malware
C. Systems Software
D. Application Software
E. None of these
Q13. Which of the following is a computer virus that replicates and spreads itse
lf, not only from file to file, but from computer to computer via e-mail and oth
er Internet traffic?
A. A worm
B. A zombie
C. A rootkit
D. A botnet
E. None of these
Q14. A botnet is:
A. a computer virus that replicates and spreads itself from computer to computer
via e-mail and other Internet traffic.
B. software that gives you administrator rights to a computer or network.
C. an exact copy or snapshot of the contents of an electronic medium.
D. a collection of computers that have been infected with blocks of code that

Das könnte Ihnen auch gefallen