LakshyaEducation.in

VEDIC MATHS Video Series
  • Home
  • Video Series
    • Vedic Maths Videos
    • Quantitative Aptitude Videos
    • Class 8 Maths Videos
    • Class 9 Maths Videos
    • Class 10 Maths Videos
  • Quiz & Solutions
  • Blog
  • Store
  • Login
  • Contact Us
  • Home
  • Topic
  • Computer Science
  • Computer Security

Computer Science

COMPUTER SECURITY MCQs

Total Questions : 66

Page 1 of 7 pages
Question 1. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______.
  1.    spammer
  2.    hacker
  3.    instant messenger
  4.    All of these
  5.    None of these
 Discuss Question
Answer is Option B. -> hacker
Question 2. A hacker contacts your phone or E-mails and attempts to acquire your password is called
  1.    spoofing
  2.    phishing
  3.    spamming
  4.    bugging
  5.    None of these
 Discuss Question
Answer is Option B. -> phishing
Question 3. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.
  1.    data
  2.    cyber
  3.    Internet
  4.    metaphysical
  5.    publicity
 Discuss Question
Answer is Option B. -> cyber
Question 4. Hackers often gain entry to a network be pretending to be at a legitimate computer
  1.    spoofing
  2.    forging
  3.    IP spoofing
  4.    None of these
 Discuss Question
Answer is Option C. -> IP spoofing
Question 5. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
  1.    Trojan horses
  2.    Keylogger
  3.    Worm
  4.    Cracker
 Discuss Question
Answer is Option A. -> Trojan horses
Question 6. A time bomb occurs during a particular
  1.    data or time
  2.    logic and data
  3.    only time
  4.    All of the above
  5.    None of these
 Discuss Question
Answer is Option C. -> only time
Question 7. Security exploit is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
 Discuss Question
Answer is Option A. -> a prepared application that takes advantage of a known weakness.
Question 8. Spoofing attack is
  1.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  2.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  3.    a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  4.    None of these
 Discuss Question
Answer is Option C. -> a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
Question 9. ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
  1.    Stealth
  2.    Polymorphic virus
  3.    Parasitic virus
  4.    Macro virus
  5.    None of these
 Discuss Question
Answer is Option A. -> Stealth
Question 10. Which one of the following is a cryptographic protocol used to secure http connection ?
  1.    Stream Control Transmission Protocol (SCTP)
  2.    Transport Layer Security (TLS)
  3.    Explicit Congestion Notification (FCN)
  4.    Resource Reservation Protocol (RRP)
  5.    None of the above
 Discuss Question
Answer is Option B. -> Transport Layer Security (TLS)
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next →
  • Share on Facebook!
  • Share on Pinterest!

Sub Topics

  • Agile Scrum
  • Ajax
  • Android
  • Angular 2
  • Angularjs
  • Artificial Intelligence
  • Asp.net
  • Automation System
  • Azure
  • Bootstrap
  • C Program
  • C#
  • Computer Memory
  • Computer Networks
  • Computer Security
  • Core Java
  • Css
  • Data Base Management System (dbms)
  • Data Mining And Data Ware House
  • Data Structure
  • Data Structures And Algorithms
  • Database
  • Database Systems
  • Dbms
  • Digital Computer Electronics
  • Disk Operating System Dos
  • Elasticsearch
  • Electronic Principles
  • Electronics Data Processing
  • Git
  • Hibernate
  • Html
  • Html5
  • Informatica
  • Information Security
  • Input And Output Devices
  • Internet Awareness
  • Ios
  • Ios Swift
  • Java Program
  • Javascript
  • Jquery
  • Json
  • Kotlin
  • Language Processors
  • Laravel
  • Linear Programming
  • Linq
  • Linux
  • Management Information Systems
  • Mongodb
  • Mysql
  • Nlp
  • Node Js
  • Nosql
  • Oracle
  • Parallel Computing
  • Php Program
  • Prestashop
  • Python
  • Rdbms
  • React Js
  • Selenium
  • Software Engineering
  • Software Testing
  • Sql
  • Sql Server
  • System Analysis And Design
  • System Programming
  • Tally
  • Transistors
  • Unix
  • Window Programming
  • Windows 2000 Server
  • Windows Nt
  • Wordpress
  • Xamarin
  • Xml

Recent Posts

  • Ssc Exam Guide Book
  • Vedic Maths Faq
  • Quantitative Aptitude Faqs
  • Sail E0 Exam Results Cancelled - Exam Will Be Rescheduled
  • Sail E0 Results 2022
  • Is Ssc Difficult Than Upsc?
  • Best Ssc Exam For Girls

Recent Questions

Q.   The Value Engineering Technique In Which Experts Of The Same....

Q.   If Transcription Should Not Be Carried Out Beyond The Insert....

Q.   Buffalo Is To Leather As Llama Is To....?

Q.   Choose The Correct Answer From The Given Options To Fill The....

Q.   The Arithmetic Mean (average) Of The First 10 Whole Numbers ....

Q.   Which Governor General Is Remembered For The Annulment Of Th....

Q.   When The Voltage Across A Capacitor Is Tripled, The Stored C....

Q.   My Mother Bakes Cakes.

Q.   Log Mean Temperature Difference In Case Of Counter Flow Comp....

Q.   Which Of The Following Is Not A Matter Of Local Government?

Q.   Which Drugs Can Easily Pass The Placental Barrier?

Q.   Which Of The Following Is Not A Benefit Of BLAST?

Q.   A Part Of John's Salary Was Cut By The Government. What....

Q.   The Swollen Part Of The Pistil Is Known As ________ .

Q.   By Definition, Make A Map Is To Select Certain Features As R....

Q.   Which Of The Following Is The Best Tube Material From Therma....

Q.   If You Are Going To Use A Combination Of Three Or More AND A....

Q.   (a) A Ball Is Dropped From A Height Of 30m. After Striking T....

Q.   What Is The Approx. Value Of W, If W=(1.5)11, Given Log2 = 0....

Q.   In The Following Questions, The Symbols $, ©, *, @ And # Ar....

Topics

Computer Aptitude
SAIL Junior Officer (E-0)
10th Grade
11th Grade
12th Grade
4th Grade
5th Grade
6th Grade
7th Grade
8th Grade
9th Grade
NCERT
Cat
Commerce
Computer Science
Engineering
English
General Knowledge
Ias
Management
Quantitative Aptitude
Reasoning Aptitude
General Studies (Finance And Economics)
Vedic Maths
Analytical Instrumentation
Biochemistry
Bioinformatics
Biology
Biotechnology
Bitsat
Business Statistics
C Programming
C++ Programming
Cell Biology
Chemistry
Cost Accounting
Drug And Pharmaceutical Biotechnology
Electrical Measurement And Instrumentation
Environment Management
Environmental Biotechnology
Enzyme Technology
Financial Management And Financial Markets
Gate
General Science
Geography
Heat Transfer
History And National Movements
Human Anatomy And Physiology
Human And Cultural Diversity
Human Resource Management
Indian Economy
Indian Geography
Indian History
Indian Polity
Instrumentation Transducers
International Relations
Life Sciences
Marketing And Marketing Management
Mass Transfer
Mechanics Of Materials
Microbiology
Neet
Professional Communication
Renewable Energy
Sociology
Surveying
Total Quality Management
Uidai Aadhaar Supervisor Certification
Virology
LakshyaEducation.in
Lakshya Education
Bhilai,Chattisgarh,India
Email: admin@lakshyaeducation.in Phone: 07893519977 (WhatsApp)

Quick Links

  • Vedic Maths
  • Quantitative Aptitude
  • Class – IX Maths
  • Class – X Maths
  • Blog

Our Services

  • About us
  • Privacy
  • TOS
  • Refund / Cancellation
  • Contact
  • Affiliate Program
  • Copyright © 2022 All Right Reserved | Lakshya Education     ( )
    Login / Register

    Your Account will be created automatically when you click the below Google or Facebook Login Button.
    •   Login With Facebook
    •  Login With Google
     Login With Email/Password