computer security set 2 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : A time bomb occurs during a particular

(a) data or time

(b) logic and data

(c) only time

(d) All of the above

e) None of these

The correct answers to the above question in:

Answer: (c)

Practice computer security (computer security set 2) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

Security exploit is

a) a prepared application that takes advantage of a known weakness.

b) a tool used to quickly check computers on a network for known weaknesses.

c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Answer: (a)

Question : 2

Spoofing attack is

a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d) None of these

Answer: (c)

Question : 3

____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.

a) Stealth

b) Polymorphic virus

c) Parasitic virus

d) Macro virus

e) None of these

Answer: (a)

Question : 4

Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

a) Trojan horses

b) Keylogger

c) Worm

d) Cracker

Answer: (a)

About Trojan Horse: 

A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.

Question : 5

Hackers often gain entry to a network be pretending to be at a legitimate computer

a) spoofing

b) forging

c) IP spoofing

d) None of these

Answer: (c)

What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.

Question : 6

Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.

a) data

b) cyber

c) Internet

d) metaphysical

e) publicity

Answer: (b)

What is Cyber security:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Recently Added Subject & Categories For All Competitive Exams

100+ Quadratic Equation Questions Answers PDF for Bank

Quadratic Equation multiple choice questions with detailed answers for IBPS RRB SO. more than 250 Attitude practice test exercises for all competitive exams

03-Jul-2024 by Careericons

Continue Reading »

IBPS Aptitude Linear Equations MCQ Questions Answers PDF

Linear equations multiple choice questions with detailed answers for IBPS RRB SO. more than 250 Attitude practice test exercises for all competitive exams

03-Jul-2024 by Careericons

Continue Reading »

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »