Computer Science
COMPUTER SECURITY MCQs
Total Questions : 66
Page 1 of 7 pages Answer is Option B. -> hacker
Answer is Option B. -> phishing
Answer is Option B. -> cyber
Answer is Option C. -> IP spoofing
Answer is Option A. -> Trojan horses
Answer is Option C. -> only time
Answer is Option A. -> a prepared application that takes advantage of a known weakness.
Answer is Option C. -> a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
Answer is Option A. -> Stealth
Answer is Option B. -> Transport Layer Security (TLS)
Recent Questions
Q. The Value Engineering Technique In Which Experts Of The Same....
Q. If Transcription Should Not Be Carried Out Beyond The Insert....
Q. Buffalo Is To Leather As Llama Is To....?
Q. Choose The Correct Answer From The Given Options To Fill The....
Q. The Arithmetic Mean (average) Of The First 10 Whole Numbers ....
Q. Which Governor General Is Remembered For The Annulment Of Th....
Q. When The Voltage Across A Capacitor Is Tripled, The Stored C....
Q. My Mother Bakes Cakes.
Q. Log Mean Temperature Difference In Case Of Counter Flow Comp....
Q. Which Of The Following Is Not A Matter Of Local Government?
Q. Which Drugs Can Easily Pass The Placental Barrier?
Q. Which Of The Following Is Not A Benefit Of BLAST?
Q. A Part Of John's Salary Was Cut By The Government. What....
Q. The Swollen Part Of The Pistil Is Known As ________ .
Q. By Definition, Make A Map Is To Select Certain Features As R....
Q. Which Of The Following Is The Best Tube Material From Therma....
Q. If You Are Going To Use A Combination Of Three Or More AND A....
Q. (a) A Ball Is Dropped From A Height Of 30m. After Striking T....
Q. What Is The Approx. Value Of W, If W=(1.5)11, Given Log2 = 0....
Q. In The Following Questions, The Symbols $, ©, *, @ And # Ar....