computer security set 2 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

(a) Trojan horses

(b) Keylogger

(c) Worm

(d) Cracker

The correct answers to the above question in:

Answer: (a)

About Trojan Horse: 

A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.

Practice computer security (computer security set 2) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

A time bomb occurs during a particular

a) data or time

b) logic and data

c) only time

d) All of the above

e) None of these

Answer: (c)

Question : 2

Security exploit is

a) a prepared application that takes advantage of a known weakness.

b) a tool used to quickly check computers on a network for known weaknesses.

c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Answer: (a)

Question : 3

Spoofing attack is

a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d) None of these

Answer: (c)

Question : 4

Hackers often gain entry to a network be pretending to be at a legitimate computer

a) spoofing

b) forging

c) IP spoofing

d) None of these

Answer: (c)

What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.

Question : 5

Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.

a) data

b) cyber

c) Internet

d) metaphysical

e) publicity

Answer: (b)

What is Cyber security:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Question : 6

A hacker contacts your phone or E-mails and attempts to acquire your password is called

a) spoofing

b) phishing

c) spamming

d) bugging

e) None of these

Answer: (b)

About Phishing:

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.

Recently Added Subject & Categories For All Competitive Exams

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »

IBPS Profit and Loss Questions Solved Problems with PDF

Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »

100+ Average Aptitude Questions Answers solutions MCQ PDF

New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »