7000+ Computer Security Questions and Answers Pdf - 2

Question: 6

It is a prepared application that takes advantage of a known weakness.

(A) Rootkit

(B) Packet sniffer

(C) Vulnerability scanner

(D) Security exploit

Ans: D

Security exploit

Question: 7

White hat is?

(A) Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed

(B) Hacker of ambiguous ethics and/or borderline legality, often frankly admitted

(C) Hacker breaks security for altruistic or a least non-malicious reasons

(D) None of these

Ans: C

Hacker breaks security for altruistic or a least non-malicious reasons

Question: 8

A packet sniffer is?

(A) A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access

(B) An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network

(C) A tool used to quickly check computers on a network for known weakness

(D) A prepared application that takes advantage of a known weakness

Ans: B

An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network

Question: 9

A spoofing attack is?

(A) A prepared application that takes advantage of a known weakness.

(B) A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

(C) An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is transmit either within the computer or over the network

(D) A tool used to quickly check computers on a network for known weakness

Ans: B

A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Question: 10

Like a virus, it is also a self replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system : it propagates through computer networks.

(A) Cracker

(B) Keylogger

(C) Worm

(D) None of these

Ans; C

Worm

Related Questions