computer security set 3 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
e) None of these
The correct answers to the above question in:
Answer: (a)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
Which virus spreads in application software?
a) Macro virus
b) Boot virus
c) File virus
d) Anti- virus
e) None of the above
Answer »Answer: (a)
A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word. It centres on software applications and does not depend on the operating system (OS). As a result, it can infect any computer running any kind of OS, including Windows, macOS and Linux.
Question : 2
Passwords enables user to
a) get into the system quickly
b) make efficient use of time
c) retain confidentiality of files
d) simplify file structure
e) None of the above
Answer »Answer: (c)
Question : 3
Attempt to gain unauthorised access to a user's system or information by pretending to be the user?
a) Spoofing
b) Hacker
c) Phishing
d) Cracker
e) None of these
Answer »Answer: (a)
Question : 4
The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.
a) Malware
b) spam
c) phishing
d) virus
e) None of these
Answer »Answer: (a)
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for malicious software.
Question : 5
White hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these
Answer »Answer: (a)
Question : 6
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit
Answer »Answer: (a)
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024
Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam
Continue Reading »
Syllogism Practice Questions Answers PDF - IBPS Clerk 2024
Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam
Continue Reading »
IBPS Clerk Prelims 2024 Synonyms Questions Solved Answers
Most important IBPS Clerk Prelims 2024 Synonyms and Antonyms multiple choice questions and answers with detailed solutions, English vocabulary PDF Download
Continue Reading »
New Cloze Test Questions and Answers PDF - IBPS Clerk 2024
The most important Cloze Test questions with detailed answers for upcoming IBPS Clerk prelims 2024. Latest English verbal ability practice MCQs, PDF
Continue Reading »