7000+ Computer Security Questions and Answers Pdf - 2
Question: 6
It is a prepared application that takes advantage of a known weakness.
(A) Rootkit
(B) Packet sniffer
(C) Vulnerability scanner
(D) Security exploit
Ans: D
Security exploit
Question: 7
White hat is?
(A) Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed
(B) Hacker of ambiguous ethics and/or borderline legality, often frankly admitted
(C) Hacker breaks security for altruistic or a least non-malicious reasons
(D) None of these
Ans: C
Hacker breaks security for altruistic or a least non-malicious reasons
Question: 8
A packet sniffer is?
(A) A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access
(B) An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network
(C) A tool used to quickly check computers on a network for known weakness
(D) A prepared application that takes advantage of a known weakness
Ans: B
An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network
Question: 9
A spoofing attack is?
(A) A prepared application that takes advantage of a known weakness.
(B) A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(C) An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is transmit either within the computer or over the network
(D) A tool used to quickly check computers on a network for known weakness
Ans: B
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Question: 10
Like a virus, it is also a self replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system : it propagates through computer networks.
(A) Cracker
(B) Keylogger
(C) Worm
(D) None of these
Ans; C
Worm
- Computer Security MCQ Objective Questions with Answers
- Computer Security Quiz Questions and Answers
- Top 100+ Computer Security Multiple Choice Questions & Answers
- 1000+ Basic Computer Quiz Questions with Answers
- Basic Computer Fundamentals Online Test
- Top 100+ Computer Fundamentals MCQ Questions and Answers
- Top 1000+ Computer Science Interview Questions and Answers
- Top 1000+ Computer Questions and Answers for Competitive Exams
- 7000+ Computer Security Questions and Answers Pdf
- 7000+ Cyber Security Quiz Questions and Answers Pdf
Post Harvest Engineering of Horticultural Crops, Cereals, Pulses, Oilseeds More
Dairy and Food Engineering MCQ Questions Pdf More
Nuclear Physics Questions for Class 10 with Answers Pdf More
Samacheer Kalvi Class 10 Science Nuclear Physics Questions More
Class 10 Science Acoustics Exam Questions & Answers Pdf More
100+ Verbal Reasoning Questions Online Test More
1000+ Puzzle Questions with Answers More
Preposition Quiz for Class 1,2,3,4,5,6,7,8,9,10 More
General English Para Jumbles Questions for IBPS Bank Exams More
IBPS RRB PO Computer Awareness Previous Year Question Paper More