MCQs
Total Questions : 66
| Page 5 of 7 pages
Answer: Option B. -> a tool used to quickly check computers on a network for known weaknesses.
Answer: (b)
Answer: (b)
Answer: Option D. -> phishing scam
Answer: (d)
Answer: (d)
Answer: Option A. -> Trojan horses
Answer: (a)
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Answer: (a)
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Answer: Option C. -> Virus
Answer: (c)
A virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.
Answer: (c)
A virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.
Answer: Option A. -> Keylogger
Answer: (a)
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
Answer: (a)
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
Answer: Option B. -> Worm
Answer: (b)
The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm
Answer: (b)
The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm
Answer: Option C. -> someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
Answer: (c)
Answer: (c)
Answer: Option C. -> software piracy
Answer: (c)
Answer: (c)
Answer: Option A. -> someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
Answer: (a)
Answer: (a)
Answer: Option A. -> Monitoring
Answer: (a)
A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.
Answer: (a)
A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.