7000+ Computer Security Questions and Answers Pdf - 1
Question: 1
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
(A) Cracker
(B) Worm
(C) Keylogger
(D) Trojan horses
Ans: D
Trojan horses
Question: 2
Black hat is?
(A) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others
(B) Hacker who utilizes technology to announce a political message
(C) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
(D) None of these
Ans: A
Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
Question: 3
It is a tool used to quickly check computers on a network for known weaknesses.
(A) Security exploit
(B) Rootkit
(C) Packet sniffer
(D) Vulnerability scanner
Ans: D
Vulnerability scanner
Question: 4
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(A) Rootkit
(B) Packet sniffer
(C) Vulnerability scanner
(D) Spoofing attack
Ans: D
Spoofing attack
Question: 5
Script kiddie is?
(A) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identify theft, intellectual property theft, or many other types of crime.
(B) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
(C) Hacker who utilizes technology to announce a political message
(D) None of these
Ans: B
A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
- Computer Security MCQ Objective Questions with Answers
- Computer Security Quiz Questions and Answers
- Top 100+ Computer Security Multiple Choice Questions & Answers
- 1000+ Basic Computer Quiz Questions with Answers
- Basic Computer Fundamentals Online Test
- Top 100+ Computer Fundamentals MCQ Questions and Answers
- Top 1000+ Computer Science Interview Questions and Answers
- Top 1000+ Computer Questions and Answers for Competitive Exams
- 7000+ Computer Security Questions and Answers Pdf
- 7000+ Cyber Security Quiz Questions and Answers Pdf
Electromagnetic Induction Questions & Answers Pdf More
A.C. Basics and Networks Quiz Questions & Answers Pdf More
Signals and Systems Quiz Questions and Answers Pdf More
Signals and Systems MCQ Questions and Answers Pdf More
Electrical Power Sources Quiz Questions & Answers Pdf More
1000+ Graph Theory Quiz with Answers Pdf More
Famous Books and Authors Quiz with Answers Pdf More
7000+ TNPSC Group 1 Prelims Question Paper with Answers More
1000+ Maths Puzzles with Answers More
1000+ Reading Comprehension Passages for Competitive Exams Pdf More