7000+ Computer Security Questions and Answers Pdf - 1
Question: 1
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
(A) Cracker
(B) Worm
(C) Keylogger
(D) Trojan horses
Ans: D
Trojan horses
Question: 2
Black hat is?
(A) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others
(B) Hacker who utilizes technology to announce a political message
(C) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
(D) None of these
Ans: A
Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
Question: 3
It is a tool used to quickly check computers on a network for known weaknesses.
(A) Security exploit
(B) Rootkit
(C) Packet sniffer
(D) Vulnerability scanner
Ans: D
Vulnerability scanner
Question: 4
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(A) Rootkit
(B) Packet sniffer
(C) Vulnerability scanner
(D) Spoofing attack
Ans: D
Spoofing attack
Question: 5
Script kiddie is?
(A) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identify theft, intellectual property theft, or many other types of crime.
(B) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
(C) Hacker who utilizes technology to announce a political message
(D) None of these
Ans: B
A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
- Computer Security MCQ Objective Questions with Answers
- Computer Security Quiz Questions and Answers
- Top 100+ Computer Security Multiple Choice Questions & Answers
- 1000+ Basic Computer Quiz Questions with Answers
- Basic Computer Fundamentals Online Test
- Top 100+ Computer Fundamentals MCQ Questions and Answers
- Top 1000+ Computer Science Interview Questions and Answers
- Top 1000+ Computer Questions and Answers for Competitive Exams
- 7000+ Computer Security Questions and Answers Pdf
- 7000+ Cyber Security Quiz Questions and Answers Pdf
7000+ Computer Networking MCQ Questions and Answers Pdf More
7000+ Microsoft Office Practical Questions and Answers Pdf More
7000+ Microsoft Office MCQ Questions and Answers Pdf More
7000+ Microsoft Office Quiz Questions and Answers Pdf More
7000+ Cyber Security Quiz Questions and Answers Pdf More
1000+ OS Interview Questions with Answers Pdf More
Top 1000+ Logic Puzzles with Answers More
MS Windows Questions and Answers for Competitive Exams Pdf More
Java OOPS Interview Questions for 3 years experienced More
Oracle DBA Interview Questions for Experienced Professionals More