Sail E0 Webinar

MCQs

Total Questions : 66 | Page 5 of 7 pages
Question 41. A vulnerability scanner is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
 Discuss Question
Answer: Option B. -> a tool used to quickly check computers on a network for known weaknesses.
Answer: (b)
Question 42. Like a virus, it is a self-replicating program. It also propagates through computer network.
  1.    Spyware
  2.    Worm Cracker
  3.    Cracker
  4.    phishing scam
  5.    None of these
 Discuss Question
Answer: Option D. -> phishing scam
Answer: (d)
Question 43. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
  1.    Trojan horses
  2.    Keylogger
  3.    Worm
  4.    Cracker
 Discuss Question
Answer: Option A. -> Trojan horses
Answer: (a)
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Question 44. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
  1.    Keylogger
  2.    Worm
  3.    Virus
  4.    Cracker
 Discuss Question
Answer: Option C. -> Virus
Answer: (c)
A virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload.
Question 45. It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
  1.    Keylogger
  2.    Worm
  3.    Virus
  4.    Cracker
 Discuss Question
Answer: Option A. -> Keylogger
Answer: (a)
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
A keylogger sometimes called a keystroke logger or keyboard capture is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
Question 46. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.
  1.    Keylogger
  2.    Worm
  3.    Cracker
  4.    None of these
 Discuss Question
Answer: Option B. -> Worm
Answer: (b)
The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm
Question 47. Blue hat is
  1.    hacker breaks security for altruistic or at least non-malicious reasons.
  2.    hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  3.    someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  4.    None of these
 Discuss Question
Answer: Option C. -> someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
Answer: (c)
Question 48. Unauthorised copying of software to be used for personal gain instead of personal backups is called
  1.    program thievery
  2.    data snatching
  3.    software piracy
  4.    program looting
  5.    data looting
 Discuss Question
Answer: Option C. -> software piracy
Answer: (c)
Question 49. Black hat is
  1.    someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
  2.    a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
  3.    hacker who utilizes technology to announce a political message.
  4.    None of these
 Discuss Question
Answer: Option A. -> someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
Answer: (a)
Question 50. Which one of the following is a key function of firewall?
  1.    Monitoring
  2.    Deleting
  3.    Copying
  4.    Moving
  5.    None of these
 Discuss Question
Answer: Option A. -> Monitoring
Answer: (a)
A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.

Latest Videos

Latest Test Papers