Sail E0 Webinar

MCQs

Total Questions : 66 | Page 4 of 7 pages
Question 31. __________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
  1.    Phishing scams
  2.    Computer viruses
  3.    Special function cards
  4.    Scanners
  5.    Keyboards
 Discuss Question
Answer: Option A. -> Phishing scams
Answer: (a)
Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details
Question 32. A spoofing attack is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
 Discuss Question
Answer: Option D. -> a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer: (d)
Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms
Question 33. Hackers
  1.    all have the same motive
  2.    is another name for users
  3.    may legally break into computers as long as they do not do any damage
  4.    are people who are allergic to computers
  5.    break into other people’s computers
 Discuss Question
Answer: Option E. -> break into other people’s computers
Answer: (e)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.
Question 34. It is a prepared application that takes advantage of a known weakness.
  1.    security exploit
  2.    vulnerability scanner
  3.    packet sniffer
  4.    rootkit
 Discuss Question
Answer: Option A. -> security exploit
Answer: (a)
An exploit is a code that takes advantage of a software vulnerability or security flaw. It is written either by security researchers as a proof-of-concept threat or by malicious actors for use in their operations. When used, exploits allow an intruder to remotely access a network and gain elevated privileges, or move deeper into the network.
Question 35. ____ are often delivered to PC through an E-mail attachment and are often designed to do harm.
  1.    Viruses
  2.    Spam
  3.    Portals
  4.    Email messages
  5.    None of these
 Discuss Question
Answer: Option A. -> Viruses
Answer: (a)
The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.
Question 36. ‘Trend Micro’ is a
  1.    virus program
  2.    anti-virus software
  3.    just a program
  4.    All of these
  5.    None of the above
 Discuss Question
Answer: Option B. -> anti-virus software
Answer: (b)
These antivirus tools are critical for users to have installed and up-to-date because a computer without antivirus software protection will be infected within minutes of connecting to the internet. The bombardment is constant, which means antivirus companies have to update their detection tools regularly to deal with the more than 60,000 new pieces of malware created daily.
Question 37. __________ are often delivered to a PC through an email attachment and are often designed to do harm.
  1.    Viruses
  2.    Spam
  3.    Portals
  4.    Email messages
  5.    None of these
 Discuss Question
Answer: Option A. -> Viruses
Answer: (a)
A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
Question 38. You can protect sensitive data from prying eyes using ______
  1.    Encryption
  2.    Passwords
  3.    File locks
  4.    File permissions
  5.    None of these
 Discuss Question
Answer: Option D. -> File permissions
Answer: (d)
Question 39. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  1.    Rootkit
  2.    Keylogger
  3.    Worm
  4.    Cracker
 Discuss Question
Answer: Option A. -> Rootkit
Answer: (a)
Question 40. It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  1.    security exploit
  2.    vulnerability scanner
  3.    packet sniffer
  4.    rootkit
 Discuss Question
Answer: Option C. -> packet sniffer
Answer: (c)

Latest Videos

Latest Test Papers