MCQOPTIONS
Saved Bookmarks
This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
These hacker breaks security for altruistic or at least non-malicious reasons. |
| A. | White hat |
| B. | Grey hat |
| C. | Blue hat |
| D. | None of these |
| Answer» B. Grey hat | |
| 2. |
Black hat is |
| A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
| B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
| C. | hacker who utilizes technology to announce a political message. |
| D. | None of these |
| Answer» B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. | |
| 3. |
A vulnerability scanner is |
| A. | a prepared application that takes advantage of a known weakness. |
| B. | a tool used to quickly check computers on a network for known weaknesses. |
| C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| Answer» C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. | |
| 4. |
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| A. | security exploit |
| B. | vulnerability scanner |
| C. | packet sniffer |
| D. | rootkit |
| Answer» B. vulnerability scanner | |
| 5. |
A spoofing attack is |
| A. | a prepared application that takes advantage of a known weakness. |
| B. | a tool used to quickly check computers on a network for known weaknesses. |
| C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| Answer» E. | |
| 6. |
A packet sniffer is |
| A. | a prepared application that takes advantage of a known weakness. |
| B. | a tool used to quickly check computers on a network for known weaknesses. |
| C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| Answer» D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. | |
| 7. |
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called? |
| A. | Trojan horses |
| B. | Keylogger |
| C. | Worm |
| D. | Cracker |
| Answer» B. Keylogger | |
| 8. |
Script kiddie is |
| A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
| B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
| C. | hacker who utilizes technology to announce a political message. |
| D. | None of these |
| Answer» C. hacker who utilizes technology to announce a political message. | |
| 9. |
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
| A. | Rootkit |
| B. | Keylogger |
| C. | Worm |
| D. | Cracker |
| Answer» B. Keylogger | |
| 10. |
It is a tool used to quickly check computers on a network for known weaknesses. |
| A. | security exploit |
| B. | vulnerability scanner |
| C. | packet sniffer |
| D. | rootkit |
| Answer» C. packet sniffer | |
| 11. |
Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks. |
| A. | Keylogger |
| B. | Worm |
| C. | Cracker |
| D. | None of these |
| Answer» C. Cracker | |
| 12. |
Blue hat is |
| A. | hacker breaks security for altruistic or at least non-malicious reasons. |
| B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
| C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
| Answer» D. | |
| 13. |
White hat is |
| A. | hacker breaks security for altruistic or at least non-malicious reasons. |
| B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
| C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
| Answer» B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted. | |
| 14. |
Rootkit is |
| A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
| D. | None of these |
| Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. | |
| 15. |
It is a prepared application that takes advantage of a known weakness. |
| A. | security exploit |
| B. | vulnerability scanner |
| C. | packet sniffer |
| D. | rootkit |
| Answer» B. vulnerability scanner | |
| 16. |
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| A. | security exploit |
| B. | vulnerability scanner |
| C. | packet sniffer |
| D. | rootkit |
| Answer» D. rootkit | |
| 17. |
Hacktivism is |
| A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
| B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
| C. | hacker who utilizes technology to announce a political message. |
| D. | None of these |
| Answer» D. None of these | |
| 18. |
Packet Sniffer is |
| A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
| D. | None of these |
| Answer» B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. | |
| 19. |
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs |
| A. | Keylogger |
| B. | Worm |
| C. | Virus |
| D. | Cracker |
| Answer» B. Worm | |
| 20. |
Security exploit is |
| A. | a prepared application that takes advantage of a known weakness. |
| B. | a tool used to quickly check computers on a network for known weaknesses. |
| C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| Answer» B. a tool used to quickly check computers on a network for known weaknesses. | |
| 21. |
Grey hat is |
| A. | hacker breaks security for altruistic or at least non-malicious reasons. |
| B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
| C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
| Answer» C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos | |
| 22. |
Spoofing attack is |
| A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
| D. | None of these |
| Answer» D. None of these | |
| 23. |
These are program designed as to seem to being or be doing one thing, but actually being or doing another. |
| A. | Trojan horses |
| B. | Keylogger |
| C. | Worm |
| D. | Cracker |
| Answer» B. Keylogger | |
| 24. |
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
| A. | White hat |
| B. | Grey hat |
| C. | Blue hat |
| D. | None of these |
| Answer» C. Blue hat | |
| 25. |
This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. |
| A. | White hat |
| B. | Grey hat |
| C. | Blue hat |
| D. | None of these |
| Answer» D. None of these | |
| 26. |
If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016] |
| A. | Authentication |
| B. | Automation |
| C. | Firewall |
| D. | Encryption |
| E. | Decryption |
| Answer» B. Automation | |
| 27. |
A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015] |
| A. | host program |
| B. | target program |
| C. | backdoor program |
| D. | Bluetooth |
| E. | Trojan horse |
| Answer» F. | |
| 28. |
...... are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015] |
| A. | Portals |
| B. | Spam |
| C. | Viruses |
| D. | Other than those given as options |
| E. | E-mail messages |
| Answer» D. Other than those given as options | |
| 29. |
The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012] |
| A. | software privacy policy |
| B. | software license |
| C. | software password manager |
| D. | software log |
| E. | None of the above |
| Answer» C. software password manager | |
| 30. |
To protect yourself from computer hacker intrusions you should install a [RBI Grade B 2012] |
| A. | firewall |
| B. | mailer |
| C. | macro |
| D. | script |
| E. | None of these |
| Answer» B. mailer | |
| 31. |
Viruses, trojan horses and worms are [IBPS Clerk 2012] |
| A. | able to harm computer system |
| B. | unable to detect if present on computer |
| C. | user-friendly applications |
| D. | harmless applications resident on computer |
| E. | None of the above |
| Answer» B. unable to detect if present on computer | |
| 32. |
The ......... of a threat measures its potential impact on a system. [IBPS Clerk 2011] |
| A. | vulnerabilities |
| B. | counter measures |
| C. | degree of harm |
| D. | susceptibility |
| E. | None of these |
| Answer» D. susceptibility | |
| 33. |
Vendor created program modifications are called [Allahabad Bank PO 2011] |
| A. | patches |
| B. | antiviruses |
| C. | hales |
| D. | fixes |
| E. | overlaps |
| Answer» B. antiviruses | |
| 34. |
A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011] |
| A. | spammer |
| B. | hacker |
| C. | instant messenger |
| D. | All of these |
| E. | None of these |
| Answer» C. instant messenger | |
| 35. |
......... is the process of finding errors in software code? |
| A. | Compiling |
| B. | Testing |
| C. | Running |
| D. | Debugging |
| E. | None of the above |
| Answer» E. None of the above | |
| 36. |
It is the process of finding errors in software code |
| A. | Debugging |
| B. | Compiling |
| C. | Testing |
| D. | All of these |
| E. | None of these |
| Answer» E. None of these | |
| 37. |
There are viruses that are triggered by the passage of time or on a certain date. |
| A. | Boot-sector viruses |
| B. | Macro viruses |
| C. | Time bombs |
| D. | Worms |
| E. | None of these |
| Answer» D. Worms | |
| 38. |
A program designed to destroy data on your computer which can travel to infect other computers, is called a |
| A. | disease |
| B. | tarpedo |
| C. | hurricave |
| D. | virus |
| E. | None of these |
| Answer» E. None of these | |
| 39. |
Antivirus software is an example of |
| A. | business software |
| B. | an operating system |
| C. | a security |
| D. | an office suite |
| E. | None of the above |
| Answer» D. an office suite | |
| 40. |
Password enables users to |
| A. | get into the system quickly |
| B. | make efficient use of time |
| C. | retain confidentiality of files |
| D. | simplify file structure |
| E. | None of the above |
| Answer» D. simplify file structure | |
| 41. |
A hacker contacts your phone or E-mails and attempts to acquire your password is called |
| A. | spoofing |
| B. | phishing |
| C. | spamming |
| D. | bugging |
| E. | None of these |
| Answer» C. spamming | |
| 42. |
A ......... is a small program embedded inside of a GIF image. |
| A. | Web bug |
| B. | cookie |
| C. | spyware application |
| D. | spam |
| E. | None of these |
| Answer» D. spam | |
| 43. |
A ......... is anything that can cause harm. |
| A. | vulnerability |
| B. | phishing |
| C. | threat |
| D. | spoof |
| E. | None of these |
| Answer» B. phishing | |
| 44. |
......... are often delivered to PC through an E-mail attachment and are often designed to do harm. |
| A. | Viruses |
| B. | Spams |
| C. | Portals |
| D. | E-mail messages |
| E. | None of these |
| Answer» C. Portals | |
| 45. |
The first computer virus is |
| A. | creeper |
| B. | PARAM |
| C. | the famous |
| D. | HARLIE |
| E. | None of these |
| Answer» B. PARAM | |
| 46. |
Abuse messaging systems to send unsolicited is |
| A. | phishing |
| B. | spam |
| C. | malware |
| D. | firewall |
| E. | adware |
| Answer» C. malware | |