computer security set 2 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) data or time
(b) logic and data
(c) only time
(d) All of the above
e) None of these
The correct answers to the above question in:
Answer: (c)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
Security exploit is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer »Answer: (a)
Question : 2
Spoofing attack is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these
Answer »Answer: (c)
Question : 3
____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
e) None of these
Answer »Answer: (a)
Question : 4
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
About Trojan Horse:
A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.
Question : 5
Hackers often gain entry to a network be pretending to be at a legitimate computer
a) spoofing
b) forging
c) IP spoofing
d) None of these
Answer »Answer: (c)
What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.
Question : 6
Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.
a) data
b) cyber
c) Internet
d) metaphysical
e) publicity
Answer »Answer: (b)
What is Cyber security:
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024
Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam
Continue Reading »
Syllogism Practice Questions Answers PDF - IBPS Clerk 2024
Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam
Continue Reading »
IBPS Clerk Prelims 2024 Synonyms Questions Solved Answers
Most important IBPS Clerk Prelims 2024 Synonyms and Antonyms multiple choice questions and answers with detailed solutions, English vocabulary PDF Download
Continue Reading »
New Cloze Test Questions and Answers PDF - IBPS Clerk 2024
The most important Cloze Test questions with detailed answers for upcoming IBPS Clerk prelims 2024. Latest English verbal ability practice MCQs, PDF
Continue Reading »