MCQs
Total Questions : 66
| Page 4 of 7 pages
Answer: Option A. -> Phishing scams
Answer: (a)
Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details
Answer: (a)
Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. it is a kind of computer virus. phishing scams are used to obtain sensitive information like user names, passwords and credit card details
Answer: Option D. -> a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer: (d)
Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms
Answer: (d)
Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms
Answer: Option E. -> break into other people’s computers
Answer: (e)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.
Answer: (e)
A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone using their abilities to gain unauthorised access to systems or networks to commit crimes. A hacker may, for example, steal information to hurt people via identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.
Answer: Option A. -> security exploit
Answer: (a)
An exploit is a code that takes advantage of a software vulnerability or security flaw. It is written either by security researchers as a proof-of-concept threat or by malicious actors for use in their operations. When used, exploits allow an intruder to remotely access a network and gain elevated privileges, or move deeper into the network.
Answer: (a)
An exploit is a code that takes advantage of a software vulnerability or security flaw. It is written either by security researchers as a proof-of-concept threat or by malicious actors for use in their operations. When used, exploits allow an intruder to remotely access a network and gain elevated privileges, or move deeper into the network.
Answer: Option A. -> Viruses
Answer: (a)
The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.
Answer: (a)
The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.
Answer: Option B. -> anti-virus software
Answer: (b)
These antivirus tools are critical for users to have installed and up-to-date because a computer without antivirus software protection will be infected within minutes of connecting to the internet. The bombardment is constant, which means antivirus companies have to update their detection tools regularly to deal with the more than 60,000 new pieces of malware created daily.
Answer: (b)
These antivirus tools are critical for users to have installed and up-to-date because a computer without antivirus software protection will be infected within minutes of connecting to the internet. The bombardment is constant, which means antivirus companies have to update their detection tools regularly to deal with the more than 60,000 new pieces of malware created daily.
Answer: Option A. -> Viruses
Answer: (a)
A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
Answer: (a)
A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
Answer: Option D. -> File permissions
Answer: (d)
Answer: (d)
Answer: Option A. -> Rootkit
Answer: (a)
Answer: (a)
Answer: Option C. -> packet sniffer
Answer: (c)
Answer: (c)