Practice Computer security - computer mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   Some viruses have delayed payload, which is sometimes called a

(a)

(b)

(c)

(d)

(e)


Q-2)   The first PC virus was developed in

(a)

(b)

(c)

(d)

(e)


Q-3)   Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.

(a)

(b)

(c)

(d)

(e)

Explanation:

What is Cyber security:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.


Q-4)   It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

(a)

(b)

(c)

(d)


Q-5)   Like a virus, it is a self-replicating program. It also propagates through computer network.

(a)

(b)

(c)

(d)

(e)


Q-6)   A ____ is a small program embedded inside of a GIF image.

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-7)   The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.

(a)

(b)

(c)

(d)

(e)

Explanation:

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for malicious software.


Q-8)   First boot sector virus is

(a)

(b)

(c)

(d)

(e)

Explanation:

The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users.  Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.


Q-9)   You can protect sensitive data from prying eyes using ______

(a)

(b)

(c)

(d)

(e)


Q-10)   A hacker contacts your phone or E-mails and attempts to acquire your password is called

(a)

(b)

(c)

(d)

(e)

Explanation:

About Phishing:

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.


Q-11)   Which one of the following is a key function of firewall?

(a)

(b)

(c)

(d)

(e)

Explanation:

A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.


Q-12)   Which virus spreads in application software?

(a)

(b)

(c)

(d)

(e)

Explanation:

A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word. It centres on software applications and does not depend on the operating system (OS). As a result, it can infect any computer running any kind of OS, including Windows, macOS and Linux.


Q-13)   If your computer keeps rebooting itself, then it is likely that _______

(a)

(b)

(c)

(d)

(e)


Q-14)   ‘Trend Micro’ is a

(a)

(b)

(c)

(d)

(e)

Explanation:

These antivirus tools are critical for users to have installed and up-to-date because a computer without antivirus software protection will be infected within minutes of connecting to the internet. The bombardment is constant, which means antivirus companies have to update their detection tools regularly to deal with the more than 60,000 new pieces of malware created daily.


Q-15)   These are program designed as to seem to being or be doing one thing, but actually being or doing another.

(a)

(b)

(c)

(d)

Explanation:

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.


Q-16)   __________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(a)

(b)

(c)

(d)

(e)

Explanation:

Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details


Q-17)   Hackers

(a)

(b)

(c)

(d)

(e)

Explanation:

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.


Q-18)   Passwords enable users to–

(a)

(b)

(c)

(d)

(e)


Q-19)   Passwords enables user to

(a)

(b)

(c)

(d)

(e)


Q-20)   What is the most common way to get a virus in your computer’s hard disk?

(a)

(b)

(c)

(d)

(e)