computer security Practice Questions Answers Test with Solutions & More Shortcuts

Question : 6

Grey hat is

a) hacker breaks security for altruistic or at least non-malicious reasons.

b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

d) None of these

Answer: (b)

Question : 7

What is the most common way to get a virus in your computer’s hard disk?

a) By installing games from their CDROMS

b) By uploading pictures from mobile phones to the computer

c) By opening emails

d) By sending emails

e) None of these

Answer: (c)

Question : 8

These hacker breaks security for altruistic or at least non-malicious reasons.

a) White hat

b) Grey hat

c) Blue hat

d) None of these

Answer: (a)

A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking. 

White hat hackers only seek vulnerabilities or exploits when they are legally permitted to do so. White hat hackers may do their research on open source software, as well as on software or systems they own or have been authorized to investigate, including products and services that operate bug bounty programs. These types of programs reward individuals with money for disclosing security flaws.

Question : 9

Rootkit is

a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d) None of these

Answer: (b)

Question : 10 [SBI Clerk, 2009]

Passwords enable users to–

a) get into the system quickly

b) make efficient use of time

c) retain confidentiality of files

d) simplify file structures

e) None of these

Answer: (c)

IMPORTANT computer mcq EXERCISES

computer security Shortcuts »

Click to Read...

computer security set 3 Online Quiz

Click to Start..
new computer security based mcq questions answers pdf

Recently Added Subject & Categories For All Competitive Exams

Ratio and Proportion Questions with Solutions, IBPS Clerk

New Ratio and Proportion Quants Aptitude based Multiple Choice Questions and Answers Practice Test Series, Quiz & Mock Test for IBPS Clerk Prelims 2024 Exam

02-May-2024 by Careericons

Continue Reading »

Top Analogy Reasoning Ability For IBPS Clerk Prelims 2024

Most Important Analogy based Verbal Reasoning Multiple choice questions and answers practice quiz series PDF, Free New Mock tests For IBPS Clerk Prelims 2024

01-May-2024 by Careericons

Continue Reading »

SSC STENO: Mensuration Area & Volume Questions Test PDF

Free Mensuration Area and Volume Aptitude-based Practice multiple questions with solutions, Quiz, Full Mock Test & PDF for SSC Steno (Grade C & D) 2024 Exam

30-Apr-2024 by Careericons

Continue Reading »

SSC STENO: Speed Time and Distance MCQ Questions Test PDF

Free Time and Distance Aptitude-based Practice multiple questions with solutions, Quiz series, Mock Test & Download PDF for SSC Steno (Grade C & D) 2024 Exam

29-Apr-2024 by Careericons

Continue Reading »