7000+ Computer Security Questions and Answers Pdf - 1

Question: 1

Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

(A) Cracker

(B) Worm

(C) Keylogger

(D) Trojan horses

Ans: D

Trojan horses

Question: 2

Black hat is?

(A) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others

(B) Hacker who utilizes technology to announce a political message

(C) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

(D) None of these

Ans: A

Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.

Question: 3

It is a tool used to quickly check computers on a network for known weaknesses.

(A) Security exploit

(B) Rootkit

(C) Packet sniffer

(D) Vulnerability scanner

Ans: D

Vulnerability scanner

Question: 4

It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

(A) Rootkit

(B) Packet sniffer

(C) Vulnerability scanner

(D) Spoofing attack

Ans: D

Spoofing attack

Question: 5

Script kiddie is?

(A) Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identify theft, intellectual property theft, or many other types of crime.

(B) A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.

(C) Hacker who utilizes technology to announce a political message

(D) None of these

Ans: B

A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.

Related Questions