computer security set 1 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : __________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(a) Phishing scams

(b) Computer viruses

(c) Special function cards

(d) Scanners

e) Keyboards

The correct answers to the above question in:

Answer: (a)

Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details

Practice computer security (computer security set 1) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

A spoofing attack is

a) a prepared application that takes advantage of a known weakness.

b) a tool used to quickly check computers on a network for known weaknesses.

c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Answer: (d)

Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms

Question : 2

____ are often delivered to PC through an E-mail attachment and are often designed to do harm.

a) Viruses

b) Spam

c) Portals

d) Email messages

e) None of these

Answer: (a)

The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.

Question : 3

Hackers

a) all have the same motive

b) is another name for users

c) may legally break into computers as long as they do not do any damage

d) are people who are allergic to computers

e) break into other people’s computers

Answer: (e)

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.

Question : 4

First boot sector virus is

a) computed

b) mind

c) brian

d) Elk Cloner

e) None of these

Answer: (c)

The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users.  Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.

Question : 5

The first computer virus is

a) creeper

b) PARAM

c) the famous

d) HARLIE

e) None of these

Answer: (a)

A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application

Question : 6

A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

a) hacker

b) analyst

c) instant messenger

d) programmer

e) spammer

Answer: (a)

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes. 

Recently Added Subject & Categories For All Competitive Exams

Simplification Questions Test PDF For SSC STENO C, D 2024

Free New Simplification Aptitude-based multiple choice questions & answers practice test series. Online Quiz PDF for SSC Stenographer (Grade C, D) 2024 Exam

16-Apr-2024 by Careericons

Continue Reading »

New Classification - Verbal MCQ Test SSC STENO 2024 Exam

Free Classification Verbal Reasoning-based multiple choice questions answers practice test series, Online MCQ Quiz PDF for SSC Steno (Grade C & D) 2024 Exam

15-Apr-2024 by Careericons

Continue Reading »

Idioms and Phrases Question Test PDF SSC STENO C & D 2024

Free General English Idioms and Phrases-based multiple choice questions and answers practice test series. Online Quiz PDF for SSC Steno Grade C & D 2024 Exam

13-Apr-2024 by Careericons

Continue Reading »

Number System Questions Test PDF For SSC STENO C & D 2024

Free New Number System Aptitude-based multiple choice questions and answers practice test series. Online Quiz PDF for SSC Stenographer (Grade C, D) 2024 Exam

12-Apr-2024 by Careericons

Continue Reading »