Sail E0 Webinar

MCQs

Total Questions : 66 | Page 6 of 7 pages
Question 51. Some viruses have delayed payload, which is sometimes called a
  1.    time
  2.    anti-virus
  3.    bomb
  4.    All of these
  5.    None of these
 Discuss Question
Answer: Option C. -> bomb
Answer: (c)
Question 52. Grey hat is
  1.    hacker breaks security for altruistic or at least non-malicious reasons.
  2.    hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  3.    someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  4.    None of these
 Discuss Question
Answer: Option B. -> hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
Answer: (b)
Question 53. Rootkit is
  1.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  2.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  3.    a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  4.    None of these
 Discuss Question
Answer: Option B. -> a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer: (b)
Question 54. What is the most common way to get a virus in your computer’s hard disk?
  1.    By installing games from their CDROMS
  2.    By uploading pictures from mobile phones to the computer
  3.    By opening emails
  4.    By sending emails
  5.    None of these
 Discuss Question
Answer: Option C. -> By opening emails
Answer: (c)
Question 55. Passwords enable users to–
  1.    get into the system quickly
  2.    make efficient use of time
  3.    retain confidentiality of files
  4.    simplify file structures
  5.    None of these
 Discuss Question
Answer: Option C. -> retain confidentiality of files
Answer: (c)
Question 56. These hacker breaks security for altruistic or at least non-malicious reasons.
  1.    White hat
  2.    Grey hat
  3.    Blue hat
  4.    None of these
 Discuss Question
Answer: Option A. -> White hat
Answer: (a)
A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking. 
White hat hackers only seek vulnerabilities or exploits when they are legally permitted to do so. White hat hackers may do their research on open source software, as well as on software or systems they own or have been authorized to investigate, including products and services that operate bug bounty programs. These types of programs reward individuals with money for disclosing security flaws.
Question 57. Which one of the following would be considered as a way that a computer virus can enter a computer system?
  1.    Opening an application previously installed on the computer
  2.    Borrowed copies of software
  3.    Viewing a website without causing any additional transactions
  4.    Running antivirus programs
  5.    None of these
 Discuss Question
Answer: Option B. -> Borrowed copies of software
Answer: (b)
Question 58. A program designed to destroy data on your compute which can travel to infect other computers, is called is
  1.    disease
  2.    torpedo
  3.    hurricane
  4.    virus
  5.    None of these
 Discuss Question
Answer: Option D. -> virus
Answer: (d)
A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and programs present on your system. 
These computer viruses are present in various types and each of them can infect a device in a different manner. 
Question 59. A packet sniffer is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
 Discuss Question
Answer: Option C. -> an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
Answer: (c)
Question 60. There are several primary categories of procedures. Which of the following is not a primary category of procedures?
  1.    Testing
  2.    Backup and recovery
  3.    Firewall development
  4.    Design
  5.    None of these
 Discuss Question
Answer: Option C. -> Firewall development
Answer: (c)
Firewall development is not a primary category of procedures.
Firewalls are defined as software or hardware device installed at the point where a network connection enters an internal network. We proposed and developed an improved software-based solution that allows all the inbound and outbound traffic to pass through the firewall.

Latest Videos

Latest Test Papers