computer security Practice Questions Answers Test with Solutions & More Shortcuts

Question : 16

Like a virus, it is a self-replicating program. It also propagates through computer network.

a) Spyware

b) Worm Cracker

c) Cracker

d) phishing scam

e) None of these

Answer: (d)

Question : 17

These are program designed as to seem to being or be doing one thing, but actually being or doing another.

a) Trojan horses

b) Keylogger

c) Worm

d) Cracker

Answer: (a)

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.

Question : 18

Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.

a) Keylogger

b) Worm

c) Cracker

d) None of these

Answer: (b)

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm

Question : 19

It is a software program designed to record (‘log’) every keystroke on the machine on which it runs

a) Keylogger

b) Worm

c) Virus

d) Cracker

Answer: (a)

A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.

A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.

Question : 20

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

a) Keylogger

b) Worm

c) Virus

d) Cracker

Answer: (c)

A virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.

IMPORTANT computer mcq EXERCISES

computer security Shortcuts »

Click to Read...

computer security set 1 Online Quiz

Click to Start..
240 computer security based computer MCQ computer security set 1 question answer explanation pdf
new computer security based mcq questions answers pdf

Recently Added Subject & Categories For All Competitive Exams

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »

IBPS Profit and Loss Questions Solved Problems with PDF

Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »

100+ Average Aptitude Questions Answers solutions MCQ PDF

New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »