computer security set 1 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : __________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(a) Phishing scams

(b) Computer viruses

(c) Special function cards

(d) Scanners

e) Keyboards

The correct answers to the above question in:

Answer: (a)

Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details

Practice computer security (computer security set 1) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

A spoofing attack is

a) a prepared application that takes advantage of a known weakness.

b) a tool used to quickly check computers on a network for known weaknesses.

c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Answer: (d)

Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms

Question : 2

____ are often delivered to PC through an E-mail attachment and are often designed to do harm.

a) Viruses

b) Spam

c) Portals

d) Email messages

e) None of these

Answer: (a)

The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.

Question : 3

Hackers

a) all have the same motive

b) is another name for users

c) may legally break into computers as long as they do not do any damage

d) are people who are allergic to computers

e) break into other people’s computers

Answer: (e)

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.

Question : 4

First boot sector virus is

a) computed

b) mind

c) brian

d) Elk Cloner

e) None of these

Answer: (c)

The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users.  Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.

Question : 5

The first computer virus is

a) creeper

b) PARAM

c) the famous

d) HARLIE

e) None of these

Answer: (a)

A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application

Question : 6

A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

a) hacker

b) analyst

c) instant messenger

d) programmer

e) spammer

Answer: (a)

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes. 

Recently Added Subject & Categories For All Competitive Exams

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »

IBPS Profit and Loss Questions Solved Problems with PDF

Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »

100+ Average Aptitude Questions Answers solutions MCQ PDF

New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »