computer security set 2 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
(b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
(c) hacker who utilizes technology to announce a political message.
(d) None of these
The correct answers to the above question in:
Answer: (c)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
If your computer keeps rebooting itself, then it is likely that _______
a) It has a virus
b) It does not have enough memory
c) There is no printer
d) There has been a power surge
e) It needs a CD-ROM
Answer »Answer: (a)
Question : 2
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
a) White hat
b) Grey hat
c) Blue hat
d) None of these
Answer »Answer: (b)
What Does Grey Hat Hacker Mean?
A grey hat hacker (also spelt gray hat hacker) is someone who may violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers. Grey hat hackers may engage in practices that seem less than completely above board but are often operating for the common good. Grey hat hackers represent the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and black hat hackers who act maliciously to exploit vulnerabilities in systems.
Question : 3
A _____ is anything that can cause harm.
a) vulnerability
b) phishing
c) threat
d) spoof
e) None of these
Answer »Answer: (c)
Question : 4
An anti-virus is a
a) program code
b) computer
c) company name
d) application software
e) None of these
Answer »Answer: (d)
Question : 5
Which one of the following is a cryptographic protocol used to secure http connection ?
a) Stream Control Transmission Protocol (SCTP)
b) Transport Layer Security (TLS)
c) Explicit Congestion Notification (FCN)
d) Resource Reservation Protocol (RRP)
e) None of the above
Answer »Answer: (b)
Question : 6
____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
e) None of these
Answer »Answer: (a)
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
Top Trigonometric Ratios and Identities MCQ for IBPS Exam
Trigonometric Ratios & Identities MCQ Objective Questions and Answers Explanations for IBPS Clerk Prelims 2024. Aptitude Mcq Practice exercise for all exams
Continue Reading »
Puzzle Reasoning Questions Answers PDF: IBPS Clerk 2024
Top Reasoning Puzzle Test questions with answers, fully solved explanation and download PDF for IBPS Clerk Prelims 2024. Aptitude MCQ-based practice test
Continue Reading »
Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024
Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam
Continue Reading »
Syllogism Practice Questions Answers PDF - IBPS Clerk 2024
Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam
Continue Reading »