Sail E0 Webinar

MCQs

Total Questions : 66 | Page 2 of 7 pages
Question 11. An anti-virus is a
  1.    program code
  2.    computer
  3.    company name
  4.    application software
  5.    None of these
 Discuss Question
Answer: Option D. -> application software
Question 12. If your computer keeps rebooting itself, then it is likely that _______
  1.    It has a virus
  2.    It does not have enough memory
  3.    There is no printer
  4.    There has been a power surge
  5.    It needs a CD-ROM
 Discuss Question
Answer: Option A. -> It has a virus
Question 13. Hacktivism is
  1.    someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
  2.    a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
  3.    hacker who utilizes technology to announce a political message.
  4.    None of these
 Discuss Question
Answer: Option C. -> hacker who utilizes technology to announce a political message.
Question 14. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  1.    White hat
  2.    Grey hat
  3.    Blue hat
  4.    None of these
 Discuss Question
Answer: Option B. -> Grey hat
Question 15. A _____ is anything that can cause harm.
  1.    vulnerability
  2.    phishing
  3.    threat
  4.    spoof
  5.    None of these
 Discuss Question
Answer: Option C. -> threat
Question 16. Script kiddie is
  1.    someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
  2.    a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
  3.    hacker who utilizes technology to announce a political message.
  4.    None of these
 Discuss Question
Answer: Option B. -> a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
Question 17. The main reason to encrypt a file is to
  1.    reduce its size
  2.    secure it for transmission
  3.    prepare it for backup
  4.    include it in the start-up sequence
  5.    None of the above
 Discuss Question
Answer: Option B. -> secure it for transmission
Question 18. Packet Sniffer is
  1.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  2.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  3.    a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  4.    None of these
 Discuss Question
Answer: Option A. -> an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
Question 19. Abuse messaging systems to send unsolicited is
  1.    phishing
  2.    spam
  3.    malware
  4.    firewall
  5.    adware
 Discuss Question
Answer: Option B. -> spam
Question 20. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  1.    White hat
  2.    Grey hat
  3.    Blue hat
  4.    None of these
 Discuss Question
Answer: Option C. -> Blue hat

Latest Videos

Latest Test Papers