Toggle navigation
Terms & Conditions
Contact
Home
GK
Computer
TRB
TNPSC
Aptitude
English
Reasoning
Technical
Bank Exams
SSC
Engineering
Puzzles
Interview
GD Topics
Blogs
Online Test
Free computer quiz Online Test - MeritNotes
Home
Online Exam
No. of Questions :10
Remaining Time :
1. These hacker breaks security for altruistic or at least non malicious reasons.
(a)
Blue hat
(b)
Grey hat
(c)
White hat
(d)
None of these
2. It is an application that capture TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit within the computer or over the network.
(a)
Rootkit
(b)
Packet sniffer
(c)
Vulnerability scanner
(d)
Security exploit
3. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
(a)
Blue hat
(b)
Grey hat
(c)
White hat
(d)
None of these
4. A vulnerability scanner is?
(a)
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access
(b)
An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network
(c)
A tool used to quickly check computers on a network for known weaknesses
(d)
A prepared application that takes advantages of a known weakness
5. It is a software program designed to record every keystroke on the machine on which it runs
(a)
Cracker
(b)
Virus
(c)
Worm
(d)
Keylogger
6. Spooking attack is?
(a)
A toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate operators
(b)
A situation in which one person or program successfully, masquerades as another by falsifying data and thereby gaining illegitimate access
(c)
An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network
(d)
None of these
7. Hacktivism is?
(a)
Hacker who utilizes technology to announce a political message
(b)
A person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others
(c)
Someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism, credit card fraud, identify theft, intellectual property theft, or many other types of crime
(d)
None of these
8. It is a self replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
(a)
Virus
(b)
Cracker
(c)
Worm
(d)
Keylogger
9. These are program designed as to seen to being or be doing one thing, but actually being or doing another.
(a)
Cracker
(b)
Worm
(c)
Keylogger
(d)
Trojan horses
10. Blue Hat is?
(a)
Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed
(b)
Hacker of ambiguous ethics and/or borderline, legally, often frankly admitted
(c)
Hacker breaks security for altruistic or at least non malicious reasons
(d)
None of these