computer security set 3 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : Blue hat is

(a) hacker breaks security for altruistic or at least non-malicious reasons.

(b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

(c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

(d) None of these

The correct answers to the above question in:

Answer: (c)

Practice computer security (computer security set 3) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

Black hat is

a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.

c) hacker who utilizes technology to announce a political message.

d) None of these

Answer: (a)

Question : 2

Some viruses have delayed payload, which is sometimes called a

a) time

b) anti-virus

c) bomb

d) All of these

e) None of these

Answer: (c)

Question : 3

Grey hat is

a) hacker breaks security for altruistic or at least non-malicious reasons.

b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

d) None of these

Answer: (b)

Question : 4

Unauthorised copying of software to be used for personal gain instead of personal backups is called

a) program thievery

b) data snatching

c) software piracy

d) program looting

e) data looting

Answer: (c)

Question : 5

Which one of the following is a key function of firewall?

a) Monitoring

b) Deleting

c) Copying

d) Moving

e) None of these

Answer: (a)

A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.

Recently Added Subject & Categories For All Competitive Exams

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »

IBPS Profit and Loss Questions Solved Problems with PDF

Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »

100+ Average Aptitude Questions Answers solutions MCQ PDF

New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »