computer security set 3 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : A program designed to destroy data on your computer which can travel to “infect” other computers is called a __________.

(a) disease

(b) torpedo

(c) hurricane

(d) virus

e) mouse

The correct answers to the above question in:

Answer: (d)

Practice computer security (computer security set 3) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

A ____ is a small program embedded inside of a GIF image.

a) web bug

b) cookie

c) spyware applications

d) spam

e) None of these above

Answer: (a)

Question : 2

It is a tool used to quickly check computers on a network for known weaknesses.

a) security exploit

b) vulnerability scanner

c) packet sniffer

d) rootkit

Answer: (b)

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to discover the weaknesses of a given system.

Question : 3

The first PC virus was developed in

a) 1980

b) 1984

c) 1986

d) 1988

e) 1987

Answer: (c)

Question : 4

Why is it unethical to share copyrighted files with your friends?

a) It is not unethical, because it is legal.

b) It is unethical because the files are being given for free.

c) Sharing copyrighted files without permission breaks copyright laws.

d) It is not unethical because the files are being given for free.

e) It is not unethical - anyone can access a computer

Answer: (c)

Question : 5

There are several primary categories of procedures. Which of the following is not a primary category of procedures?

a) Testing

b) Backup and recovery

c) Firewall development

d) Design

e) None of these

Answer: (c)

Firewall development is not a primary category of procedures.

Firewalls are defined as software or hardware device installed at the point where a network connection enters an internal network. We proposed and developed an improved software-based solution that allows all the inbound and outbound traffic to pass through the firewall.

Question : 6

A program designed to destroy data on your compute which can travel to infect other computers, is called is

a) disease

b) torpedo

c) hurricane

d) virus

e) None of these

Answer: (d)

A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and programs present on your system. 

These computer viruses are present in various types and each of them can infect a device in a different manner. 

Recently Added Subject & Categories For All Competitive Exams

Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024

Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam

17-May-2024 by Careericons

Continue Reading »

Syllogism Practice Questions Answers PDF - IBPS Clerk 2024

Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam

16-May-2024 by Careericons

Continue Reading »

IBPS Clerk Prelims 2024 Synonyms Questions Solved Answers

Most important IBPS Clerk Prelims 2024 Synonyms and Antonyms multiple choice questions and answers with detailed solutions, English vocabulary PDF Download

14-May-2024 by Careericons

Continue Reading »

New Cloze Test Questions and Answers PDF - IBPS Clerk 2024

The most important Cloze Test questions with detailed answers for upcoming IBPS Clerk prelims 2024. Latest English verbal ability practice MCQs, PDF

13-May-2024 by Careericons

Continue Reading »