Sail E0 Webinar

MCQs

Total Questions : 66 | Page 3 of 7 pages
Question 21. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  1.    security exploit
  2.    vulnerability scanner
  3.    packet sniffer
  4.    rootkit
 Discuss Question
Answer: Option A. -> security exploit
Question 22. White hat is
  1.    hacker breaks security for altruistic or at least non-malicious reasons.
  2.    hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  3.    someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  4.    None of these
 Discuss Question
Answer: Option A. -> hacker breaks security for altruistic or at least non-malicious reasons.
Question 23. The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.
  1.    Malware
  2.    spam
  3.    phishing
  4.    virus
  5.    None of these
 Discuss Question
Answer: Option A. -> Malware
Question 24. Firewalls are used to protect against _________
  1.    Unauthorized Attacks
  2.    Virus Attacks
  3.    Data Driven Attacks
  4.    Fire Attacks
  5.    None of these
 Discuss Question
Answer: Option A. -> Unauthorized Attacks
Question 25. Which virus spreads in application software?
  1.    Macro virus
  2.    Boot virus
  3.    File virus
  4.    Anti- virus
  5.    None of the above
 Discuss Question
Answer: Option A. -> Macro virus
Question 26. Passwords enables user to
  1.    get into the system quickly
  2.    make efficient use of time
  3.    retain confidentiality of files
  4.    simplify file structure
  5.    None of the above
 Discuss Question
Answer: Option C. -> retain confidentiality of files
Question 27. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
  1.    Keylogger
  2.    Worm
  3.    Virus
  4.    Cracker
  5.    None of the above
 Discuss Question
Answer: Option C. -> Virus
Answer: (c)
The term ‘Virus’ stands for Vital Information Resources under Siege. A computer virus is a self-replicating program containing code that explicitly copies itself into other executable codes or programs.
Question 28. The first computer virus is
  1.    creeper
  2.    PARAM
  3.    the famous
  4.    HARLIE
  5.    None of these
 Discuss Question
Answer: Option A. -> creeper
Answer: (a)
A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application
Question 29. First boot sector virus is
  1.    computed
  2.    mind
  3.    brian
  4.    Elk Cloner
  5.    None of these
 Discuss Question
Answer: Option C. -> brian
Answer: (c)
The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users.  Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.
Question 30. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
  1.    hacker
  2.    analyst
  3.    instant messenger
  4.    programmer
  5.    spammer
 Discuss Question
Answer: Option A. -> hacker
Answer: (a)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes. 

Latest Videos

Latest Test Papers