Toggle navigation
Terms & Conditions
Contact
Home
GK
Computer
TRB
TNPSC
Aptitude
English
Reasoning
Technical
Bank Exams
SSC
Engineering
Puzzles
Interview
GD Topics
Blogs
Online Test
Free computer quiz Online Test - MeritNotes
Home
Online Exam
No. of Questions :10
Remaining Time :
1. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
(a)
Cracker
(b)
Worm
(c)
Keylogger
(d)
Trojan horses
2. A spoofing attack is?
(a)
A prepared application that takes advantage of a known weakness.
(b)
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(c)
An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is transmit either within the computer or over the network
(d)
A tool used to quickly check computers on a network for known weakness
3. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(a)
Rootkit
(b)
Packet sniffer
(c)
Vulnerability scanner
(d)
Spoofing attack
4. Black hat is?
(a)
A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others
(b)
Hacker who utilizes technology to announce a political message
(c)
Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
(d)
None of these
5. White hat is?
(a)
Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed
(b)
Hacker of ambiguous ethics and/or borderline legality, often frankly admitted
(c)
Hacker breaks security for altruistic or a least non-malicious reasons
(d)
None of these
6. Like a virus, it is also a self replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system : it propagates through computer networks.
(a)
Cracker
(b)
Keylogger
(c)
Worm
(d)
None of these
7. A packet sniffer is?
(a)
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access
(b)
An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network
(c)
A tool used to quickly check computers on a network for known weakness
(d)
A prepared application that takes advantage of a known weakness
8. Script kiddie is?
(a)
Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identify theft, intellectual property theft, or many other types of crime.
(b)
A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
(c)
Hacker who utilizes technology to announce a political message
(d)
None of these
9. It is a prepared application that takes advantage of a known weakness.
(a)
Rootkit
(b)
Packet sniffer
(c)
Vulnerability scanner
(d)
Security exploit
10. It is a tool used to quickly check computers on a network for known weaknesses.
(a)
Security exploit
(b)
Rootkit
(c)
Packet sniffer
(d)
Vulnerability scanner