in Education by
Use of _______________ can bring external files and worms and virus along with it to the internal systems. (a) smart-watch (b) pen drive (c) laptop (d) iPod This question was posed to me in an online interview. The origin of the question is Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (b) pen drive The explanation is: Use of pen drive to bring your work from home tasks to office systems may bring worms and virus along with it (if your home system is infected with any malware or infected programs) and may cause harm to your office systems.

Related questions

0 votes
    Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _______________ infects the master boot record and it is challenging and a complex task to remove this virus. ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Who was the first individual to distribute computer worms through internet? (a) Vladimir Levin (b) Bill Landreth (c ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    A sniffer, on the whole turns your system's NIC to the licentious mode so that it can listen to all ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In live system scanning, it is checked which hosts are up in the network by pinging the systems in the ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    The logical port is associated with the type of protocol used along with the IP address of the host. (a) True ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In mid-1981, the 1^st virus for Apple computers with the name _________ came into existence. (a) Apple ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________ is software that is installed using an internet connection or they come by-default with operating systems. (a) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...