Practice Computer security - computer mcq Online Quiz (set-2) For All Competitive Exams

Q-1)   A program designed to destroy data on your computer which can travel to “infect” other computers is called a __________.

(a)

(b)

(c)

(d)

(e)


Q-2)   A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

(a)

(b)

(c)

(d)

(e)

Explanation:

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes. 


Q-3)   Abuse messaging systems to send unsolicited is

(a)

(b)

(c)

(d)

(e)


Q-4)   The first computer virus is

(a)

(b)

(c)

(d)

(e)

Explanation:

A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application


Q-5)   ____ are often delivered to PC through an E-mail attachment and are often designed to do harm.

(a)

(b)

(c)

(d)

(e)

Explanation:

The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.


Q-6)   Hackers often gain entry to a network be pretending to be at a legitimate computer

(a)

(b)

(c)

(d)

Explanation:

What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.


Q-7)   It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(a)

(b)

(c)

(d)

(e)

Explanation:

The term ‘Virus’ stands for Vital Information Resources under Siege. A computer virus is a self-replicating program containing code that explicitly copies itself into other executable codes or programs.


Q-8)   Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.

(a)

(b)

(c)

(d)

Explanation:

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm


Q-9)   It is a software program designed to record (‘log’) every keystroke on the machine on which it runs

(a)

(b)

(c)

(d)

Explanation:

A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.

A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.


Q-10)   It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(a)

(b)

(c)

(d)

Explanation:

A virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.


Q-11)   Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

(a)

(b)

(c)

(d)

Explanation:

About Trojan Horse: 

A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.


Q-12)   A _____ is anything that can cause harm.

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-13)   The main reason to encrypt a file is to

(a)

(b)

(c)

(d)

(e)


Q-14)   It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

(a)

(b)

(c)

(d)


Q-15)   Unauthorised copying of software to be used for personal gain instead of personal backups is called

(a)

(b)

(c)

(d)

(e)


Q-16)   Why is it unethical to share copyrighted files with your friends?

(a)

(b)

(c)

(d)

(e)


Q-17)   Which one of the following is a cryptographic protocol used to secure http connection ?

(a)

(b)

(c)

(d)

(e)


Q-18)   Which one of the following would be considered as a way that a computer virus can enter a computer system?

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-19)   A vulnerability scanner is

(a)

(b)

(c)

(d)


Q-20)   Security exploit is

(a)

(b)

(c)

(d)