computer security Practice Questions Answers Test with Solutions & More Shortcuts

Question : 1

A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______.

a) spammer

b) hacker

c) instant messenger

d) All of these

e) None of these

Answer: (b)

A person who uses his or her expertise to gain access to other people's computer information is known as a hacker.

Question : 2

A hacker contacts your phone or E-mails and attempts to acquire your password is called

a) spoofing

b) phishing

c) spamming

d) bugging

e) None of these

Answer: (b)

About Phishing:

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.

Question : 3

Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.

a) data

b) cyber

c) Internet

d) metaphysical

e) publicity

Answer: (b)

What is Cyber security:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Question : 4

Hackers often gain entry to a network be pretending to be at a legitimate computer

a) spoofing

b) forging

c) IP spoofing

d) None of these

Answer: (c)

What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.

Question : 5

Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

a) Trojan horses

b) Keylogger

c) Worm

d) Cracker

Answer: (a)

About Trojan Horse: 

A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.

IMPORTANT computer mcq EXERCISES

computer security Shortcuts »

Click to Read...

computer security set 2 Online Quiz

Click to Start..
241 computer security based computer MCQ computer security set 2 question answer explanation pdf
new computer security based mcq questions answers pdf

Recently Added Subject & Categories For All Competitive Exams

SSC STENO: Speed Time and Distance MCQ Questions Test PDF

Free Time and Distance Aptitude-based Practice multiple questions with solutions, Quiz series, Mock Test & Download PDF for SSC Steno (Grade C & D) 2024 Exam

29-Apr-2024 by Careericons

Continue Reading »

SSC STENO: Time & Work Questions Solved Problems with PDF

Free Time and work Aptitude-based Practice multiple questions with solutions, Quiz series, Mock Test & Downloadable PDF for SSC Steno (Grade C & D) 2024 Exam

27-Apr-2024 by Careericons

Continue Reading »

SSC STENO 2024: Free Reading Comprehension MCQ Test PDF

Top Reading Comprehension English Section-wise multiple choice questions and answers, Full Mock Test Series & Online Quiz for SSC Steno Grade C & D 2024 Exam

26-Apr-2024 by Careericons

Continue Reading »

Free Percentage Questions Answers for SSC STENO 2024 Exam

Important Top Percentage Aptitude-based multiple choice questions and answers practice quiz series, Online Mock Test PDF for SSC Steno Grade C & D 2024 Exam

25-Apr-2024 by Careericons

Continue Reading »