Practice Set 2 question answer - computer mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.

(a)

(b)

(c)

(d)

(e)

Explanation:

What is Cyber security:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.


Q-2)   Abuse messaging systems to send unsolicited is

(a)

(b)

(c)

(d)

(e)


Q-3)   A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______.

(a)

(b)

(c)

(d)

(e)

Explanation:

A person who uses his or her expertise to gain access to other people's computer information is known as a hacker.


Q-4)   ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-5)   A hacker contacts your phone or E-mails and attempts to acquire your password is called

(a)

(b)

(c)

(d)

(e)

Explanation:

About Phishing:

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.


Q-6)   Hackers often gain entry to a network be pretending to be at a legitimate computer

(a)

(b)

(c)

(d)

Explanation:

What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.


Q-7)   This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

(a)

(b)

(c)

(d)

Explanation:

What Does Grey Hat Hacker Mean?

A grey hat hacker (also spelt gray hat hacker) is someone who may violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers. Grey hat hackers may engage in practices that seem less than completely above board but are often operating for the common good. Grey hat hackers represent the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and black hat hackers who act maliciously to exploit vulnerabilities in systems.


Q-8)   This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

(a)

(b)

(c)

(d)

Explanation:

Blue hackers don’t necessarily care about money or fame. They hack to take personal revenge for a real — or perceived — sleight from a person, employer, institution, or government. Blue hat hackers use malware and deploy various cyber attacks on their enemies’ servers/networks to cause harm to their data, websites, or devices.

Sometimes, blue hat hackers use various hacking technics to bypass authentication mechanisms to gain unauthorized access to their targets’ email clients or social media profiles. This gives them the ability to send emails and post inappropriate messages from those profiles to take revenge.

Blue hat hackers perform penetration testing and deploy various cyber attacks without causing damage. Microsoft often organizes such invite-only conferences to test its Windows programs. That’s why some blue hats are known as blue hats Microsoft hackers.


Q-9)   A time bomb occurs during a particular

(a)

(b)

(c)

(d)

(e)


Q-10)   An anti-virus is a

(a)

(b)

(c)

(d)

(e)