computer security set 2 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) data or time
(b) logic and data
(c) only time
(d) All of the above
e) None of these
The correct answers to the above question in:
Answer: (c)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
Security exploit is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer »Answer: (a)
Question : 2
Spoofing attack is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these
Answer »Answer: (c)
Question : 3
____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
e) None of these
Answer »Answer: (a)
Question : 4
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
About Trojan Horse:
A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.
Question : 5
Hackers often gain entry to a network be pretending to be at a legitimate computer
a) spoofing
b) forging
c) IP spoofing
d) None of these
Answer »Answer: (c)
What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.
Question : 6
Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.
a) data
b) cyber
c) Internet
d) metaphysical
e) publicity
Answer »Answer: (b)
What is Cyber security:
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
100+ Quadratic Equation Questions Answers PDF for Bank
Quadratic Equation multiple choice questions with detailed answers for IBPS RRB SO. more than 250 Attitude practice test exercises for all competitive exams
Continue Reading »
IBPS Aptitude Linear Equations MCQ Questions Answers PDF
Linear equations multiple choice questions with detailed answers for IBPS RRB SO. more than 250 Attitude practice test exercises for all competitive exams
Continue Reading »
New 100+ Compound Interest MCQ with Answers PDF for IBPS
Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams
Continue Reading »
100+ Mixture and Alligation MCQ Questions PDF for IBPS
Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams
Continue Reading »