computer security Practice Questions Answers Test with Solutions & More Shortcuts

Question : 16

Script kiddie is

a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.

c) hacker who utilizes technology to announce a political message.

d) None of these

Answer: (b)

Question : 17

The main reason to encrypt a file is to

a) reduce its size

b) secure it for transmission

c) prepare it for backup

d) include it in the start-up sequence

e) None of the above

Answer: (b)

Question : 18

Packet Sniffer is

a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d) None of these

Answer: (a)

Question : 19

Abuse messaging systems to send unsolicited is

a) phishing

b) spam

c) malware

d) firewall

e) adware

Answer: (b)

Question : 20

This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

a) White hat

b) Grey hat

c) Blue hat

d) None of these

Answer: (c)

Blue hackers don’t necessarily care about money or fame. They hack to take personal revenge for a real — or perceived — sleight from a person, employer, institution, or government. Blue hat hackers use malware and deploy various cyber attacks on their enemies’ servers/networks to cause harm to their data, websites, or devices.

Sometimes, blue hat hackers use various hacking technics to bypass authentication mechanisms to gain unauthorized access to their targets’ email clients or social media profiles. This gives them the ability to send emails and post inappropriate messages from those profiles to take revenge.

Blue hat hackers perform penetration testing and deploy various cyber attacks without causing damage. Microsoft often organizes such invite-only conferences to test its Windows programs. That’s why some blue hats are known as blue hats Microsoft hackers.

IMPORTANT computer mcq EXERCISES

computer security Shortcuts »

Click to Read...

computer security set 2 Online Quiz

Click to Start..
241 computer security based computer MCQ computer security set 2 question answer explanation pdf
new computer security based mcq questions answers pdf

Recently Added Subject & Categories For All Competitive Exams

New 100+ Compound Interest MCQ with Answers PDF for IBPS

Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams

02-Jul-2024 by Careericons

Continue Reading »

100+ Mixture and Alligation MCQ Questions PDF for IBPS

Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams

02-Jul-2024 by Careericons

Continue Reading »

IBPS Profit and Loss Questions Solved Problems with PDF

Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »

100+ Average Aptitude Questions Answers solutions MCQ PDF

New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams

28-Jun-2024 by Careericons

Continue Reading »