computer security set 3 Detailed Explanation And More Example

MOST IMPORTANT computer mcq - 3 EXERCISES

Top 20,000+ Computer Memory Based Exercises

The following question based on computer security topic of computer mcq

Questions : It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

(a) security exploit

(b) vulnerability scanner

(c) packet sniffer

(d) rootkit

The correct answers to the above question in:

Answer: (a)

Practice computer security (computer security set 3) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more computer security Based Computer Questions and Answers

Question : 1

White hat is

a) hacker breaks security for altruistic or at least non-malicious reasons.

b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

d) None of these

Answer: (a)

Question : 2

The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.

a) Malware

b) spam

c) phishing

d) virus

e) None of these

Answer: (a)

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for malicious software.

Question : 3

Firewalls are used to protect against _________

a) Unauthorized Attacks

b) Virus Attacks

c) Data Driven Attacks

d) Fire Attacks

e) None of these

Answer: (a)

Question : 4

________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

a) Phishing trips

b) Computer viruses

c) Spyware scams

d) Viruses

e) Phishing scams

Answer: (e)

Question : 5

The first PC virus was developed in

a) 1980

b) 1984

c) 1986

d) 1988

e) 1987

Answer: (c)

Question : 6

It is a tool used to quickly check computers on a network for known weaknesses.

a) security exploit

b) vulnerability scanner

c) packet sniffer

d) rootkit

Answer: (b)

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to discover the weaknesses of a given system.

Recently Added Subject & Categories For All Competitive Exams

Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024

Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam

17-May-2024 by Careericons

Continue Reading »

Syllogism Practice Questions Answers PDF - IBPS Clerk 2024

Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam

16-May-2024 by Careericons

Continue Reading »

IBPS Clerk Prelims 2024 Synonyms Questions Solved Answers

Most important IBPS Clerk Prelims 2024 Synonyms and Antonyms multiple choice questions and answers with detailed solutions, English vocabulary PDF Download

14-May-2024 by Careericons

Continue Reading »

New Cloze Test Questions and Answers PDF - IBPS Clerk 2024

The most important Cloze Test questions with detailed answers for upcoming IBPS Clerk prelims 2024. Latest English verbal ability practice MCQs, PDF

13-May-2024 by Careericons

Continue Reading »