Sail E0 Webinar

MCQs

Total Questions : 66 | Page 1 of 7 pages
Question 1. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______.
  1.    spammer
  2.    hacker
  3.    instant messenger
  4.    All of these
  5.    None of these
 Discuss Question
Answer: Option B. -> hacker
Question 2. A hacker contacts your phone or E-mails and attempts to acquire your password is called
  1.    spoofing
  2.    phishing
  3.    spamming
  4.    bugging
  5.    None of these
 Discuss Question
Answer: Option B. -> phishing
Question 3. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.
  1.    data
  2.    cyber
  3.    Internet
  4.    metaphysical
  5.    publicity
 Discuss Question
Answer: Option B. -> cyber
Question 4. Hackers often gain entry to a network be pretending to be at a legitimate computer
  1.    spoofing
  2.    forging
  3.    IP spoofing
  4.    None of these
 Discuss Question
Answer: Option C. -> IP spoofing
Question 5. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
  1.    Trojan horses
  2.    Keylogger
  3.    Worm
  4.    Cracker
 Discuss Question
Answer: Option A. -> Trojan horses
Question 6. A time bomb occurs during a particular
  1.    data or time
  2.    logic and data
  3.    only time
  4.    All of the above
  5.    None of these
 Discuss Question
Answer: Option C. -> only time
Question 7. Security exploit is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
 Discuss Question
Answer: Option A. -> a prepared application that takes advantage of a known weakness.
Question 8. Spoofing attack is
  1.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  2.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  3.    a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  4.    None of these
 Discuss Question
Answer: Option C. -> a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
Question 9. ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
  1.    Stealth
  2.    Polymorphic virus
  3.    Parasitic virus
  4.    Macro virus
  5.    None of these
 Discuss Question
Answer: Option A. -> Stealth
Question 10. Which one of the following is a cryptographic protocol used to secure http connection ?
  1.    Stream Control Transmission Protocol (SCTP)
  2.    Transport Layer Security (TLS)
  3.    Explicit Congestion Notification (FCN)
  4.    Resource Reservation Protocol (RRP)
  5.    None of the above
 Discuss Question
Answer: Option B. -> Transport Layer Security (TLS)

Latest Videos

Latest Test Papers