computer security set 1 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) security exploit
(b) vulnerability scanner
(c) packet sniffer
(d) rootkit
The correct answers to the above question in:
Answer: (c)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
A vulnerability scanner is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer »Answer: (b)
Question : 2
Like a virus, it is a self-replicating program. It also propagates through computer network.
a) Spyware
b) Worm Cracker
c) Cracker
d) phishing scam
e) None of these
Answer »Answer: (d)
Question : 3
These are program designed as to seem to being or be doing one thing, but actually being or doing another.
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Question : 4
You can protect sensitive data from prying eyes using ______
a) Encryption
b) Passwords
c) File locks
d) File permissions
e) None of these
Answer »Answer: (d)
Question : 5
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
a) Rootkit
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
Question : 6
__________ are often delivered to a PC through an email attachment and are often designed to do harm.
a) Viruses
b) Spam
c) Portals
d) Email messages
e) None of these
Answer »Answer: (a)
A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
SSC STENO: Speed Time and Distance MCQ Questions Test PDF
Free Time and Distance Aptitude-based Practice multiple questions with solutions, Quiz series, Mock Test & Download PDF for SSC Steno (Grade C & D) 2024 Exam
Continue Reading »
SSC STENO: Time & Work Questions Solved Problems with PDF
Free Time and work Aptitude-based Practice multiple questions with solutions, Quiz series, Mock Test & Downloadable PDF for SSC Steno (Grade C & D) 2024 Exam
Continue Reading »
SSC STENO 2024: Free Reading Comprehension MCQ Test PDF
Top Reading Comprehension English Section-wise multiple choice questions and answers, Full Mock Test Series & Online Quiz for SSC Steno Grade C & D 2024 Exam
Continue Reading »
Free Percentage Questions Answers for SSC STENO 2024 Exam
Important Top Percentage Aptitude-based multiple choice questions and answers practice quiz series, Online Mock Test PDF for SSC Steno Grade C & D 2024 Exam
Continue Reading »