computer security set 2 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : Hacktivism is

(a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

(b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.

(c) hacker who utilizes technology to announce a political message.

(d) None of these

The correct answers to the above question in:

Answer: (c)

Practice computer security (computer security set 2) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

If your computer keeps rebooting itself, then it is likely that _______

a) It has a virus

b) It does not have enough memory

c) There is no printer

d) There has been a power surge

e) It needs a CD-ROM

Answer: (a)

Question : 2

This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

a) White hat

b) Grey hat

c) Blue hat

d) None of these

Answer: (b)

What Does Grey Hat Hacker Mean?

A grey hat hacker (also spelt gray hat hacker) is someone who may violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers. Grey hat hackers may engage in practices that seem less than completely above board but are often operating for the common good. Grey hat hackers represent the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and black hat hackers who act maliciously to exploit vulnerabilities in systems.

Question : 3

A _____ is anything that can cause harm.

a) vulnerability

b) phishing

c) threat

d) spoof

e) None of these

Answer: (c)

Question : 4

An anti-virus is a

a) program code

b) computer

c) company name

d) application software

e) None of these

Answer: (d)

Question : 5

Which one of the following is a cryptographic protocol used to secure http connection ?

a) Stream Control Transmission Protocol (SCTP)

b) Transport Layer Security (TLS)

c) Explicit Congestion Notification (FCN)

d) Resource Reservation Protocol (RRP)

e) None of the above

Answer: (b)

Question : 6

____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.

a) Stealth

b) Polymorphic virus

c) Parasitic virus

d) Macro virus

e) None of these

Answer: (a)

Recently Added Subject & Categories For All Competitive Exams

Top Trigonometric Ratios and Identities MCQ for IBPS Exam

Trigonometric Ratios & Identities MCQ Objective Questions and Answers Explanations for IBPS Clerk Prelims 2024. Aptitude Mcq Practice exercise for all exams

21-May-2024 by Careericons

Continue Reading »

Puzzle Reasoning Questions Answers PDF: IBPS Clerk 2024

Top Reasoning Puzzle Test questions with answers, fully solved explanation and download PDF for IBPS Clerk Prelims 2024. Aptitude MCQ-based practice test

20-May-2024 by Careericons

Continue Reading »

Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024

Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam

17-May-2024 by Careericons

Continue Reading »

Syllogism Practice Questions Answers PDF - IBPS Clerk 2024

Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam

16-May-2024 by Careericons

Continue Reading »