MCQOPTIONS
Saved Bookmarks
This section includes 33 Mcqs, each offering curated multiple-choice questions to sharpen your Computer knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
........ are often delivered to PC through an E-mail attachment and are often designed to do harm. |
| A. | Viruses |
| B. | Spams |
| C. | Portals |
| D. | E-Mail messages |
| E. | None of these |
| Answer» C. Portals | |
| 2. |
............. is a form of virus explicitly designed to hide itself from detection by antivirus software. |
| A. | Stealth virus |
| B. | Polymorphic virus |
| C. | Parasitic virus |
| D. | Macro virus |
| E. | None of these |
| Answer» D. Macro virus | |
| 3. |
A ............ is anything that can cause harm. |
| A. | vulnerability |
| B. | phishing |
| C. | threat |
| D. | spoof |
| E. | None of these |
| Answer» B. phishing | |
| 4. |
A ....... is a small program embedded inside of a GIF image. |
| A. | Web bug |
| B. | cookie |
| C. | spyware application |
| D. | spam |
| E. | None of these |
| Answer» D. spam | |
| 5. |
A hacker contacts you phone of E-mail and attempts to acquire your password is called |
| A. | spoofing |
| B. | phishing |
| C. | spamming |
| D. | buging |
| E. | None of these |
| Answer» C. spamming | |
| 6. |
Hackers often gain entry to a network be pretending to be att a legitimate computer |
| A. | spoofing |
| B. | forging |
| C. | IP spoofing |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 7. |
The unautorised real-time interception of a private communication such as a phone call, instant message known as |
| A. | Replay |
| B. | Eavesdropping |
| C. | Patches |
| D. | Payloads |
| E. | None of these |
| Answer» C. Patches | |
| 8. |
Which virus spreads in application software ? |
| A. | Macro virus |
| B. | Boot virus |
| C. | File virus |
| D. | Antivirus |
| E. | None of these |
| Answer» B. Boot virus | |
| 9. |
What is a person called who uses a computer to cause harm to people or destroy critical systems ? |
| A. | Cyber Terrorist |
| B. | Black-hat-Hacker |
| C. | Cyber Cracker |
| D. | Hacktivist |
| E. | Other than those given as options |
| Answer» D. Hacktivist | |
| 10. |
......... refers to the unauthorised copying and distribution of software. |
| A. | Hacking |
| B. | Software piracy |
| C. | Software literacy |
| D. | Cracking |
| E. | Copyright |
| Answer» C. Software literacy | |
| 11. |
Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as |
| A. | Mailcious software (malware) |
| B. | adware |
| C. | scareware |
| D. | spyware |
| E. | firewall |
| Answer» B. adware | |
| 12. |
All of the following are examples of real-security and privacy risks except |
| A. | hackers |
| B. | spam |
| C. | viruses |
| D. | identify theft |
| E. | None of these |
| Answer» D. identify theft | |
| 13. |
Which of the following refers to dangerous programs that can be caught of opening E-mail attachments and downloading software from the Internet ? |
| A. | Utility |
| B. | Virus |
| C. | Honey Pot |
| D. | Spam |
| E. | App |
| Answer» C. Honey Pot | |
| 14. |
Which of the following enables to determine how often a user visited a Website ? |
| A. | Hackers |
| B. | Spammers |
| C. | Phish |
| D. | Identity thefts |
| E. | Cookies |
| Answer» B. Spammers | |
| 15. |
TO protect yourself from computer hacker intrusions you should install a |
| A. | firwall |
| B. | mailer |
| C. | macro |
| D. | script |
| E. | None of these |
| Answer» B. mailer | |
| 16. |
If your computer rebooting itself then it is likely that |
| A. | It has a virus |
| B. | It does not have enough memory |
| C. | There is no printer |
| D. | There has been a power surge |
| E. | It need a CD-ROM |
| Answer» B. It does not have enough memory | |
| 17. |
The legal right to use software based on specific restrictions is granted via a |
| A. | software privacy policy |
| B. | software license |
| C. | software password manager |
| D. | software log |
| E. | None of the above |
| Answer» C. software password manager | |
| 18. |
........ are attempts by individuals to obtain confidential information from you by falsifying their identity. |
| A. | Phishing trips |
| B. | Computer viruses |
| C. | Spyware scams |
| D. | Viruses |
| E. | Phishing scams |
| Answer» B. Computer viruses | |
| 19. |
The ....... of a threat measures its potential impact on a system. |
| A. | vulnerabilities |
| B. | counter measures |
| C. | degree of harm |
| D. | susceptibility |
| E. | None of these |
| Answer» D. susceptibility | |
| 20. |
Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ? |
| A. | Spoofing |
| B. | Phishing |
| C. | Stalking |
| D. | Hacking |
| E. | None of these |
| Answer» C. Stalking | |
| 21. |
Which one of the following is a key function of firewall ? |
| A. | Monitoring |
| B. | Deleting |
| C. | Copying |
| D. | Moving |
| E. | None of these |
| Answer» B. Deleting | |
| 22. |
A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a |
| A. | spammer |
| B. | hacker |
| C. | instant messenger |
| D. | All of these |
| E. | None of these |
| Answer» C. instant messenger | |
| 23. |
Vendor created program modifications are called |
| A. | patches |
| B. | antiviruses |
| C. | hales |
| D. | fixes |
| E. | overlaps |
| Answer» B. antiviruses | |
| 24. |
........ is the process of finding errors in software code ? |
| A. | Compiling |
| B. | Testing |
| C. | Running |
| D. | Debugging |
| E. | None of the above |
| Answer» E. None of the above | |
| 25. |
Which one of the following is a cryptographic protocol used to secure http connections ? |
| A. | Stream Control Transmission Protocol (SCTP) |
| B. | Transport Layer Security (TLS) |
| C. | Explicit Congestion Notification (ECN) |
| D. | Resource Reservation Protocol (RRP) |
| E. | None of the above |
| Answer» C. Explicit Congestion Notification (ECN) | |
| 26. |
A firewall operated by |
| A. | the pre-purchase phase |
| B. | isolating intranet from extranet |
| C. | screening packets to/from the network and provide controllable filtering of network traffic |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 27. |
A program designed to designed to destroy data on your computer which can travel to infect other computers, is called a |
| A. | disease |
| B. | tarpedo |
| C. | hurricave |
| D. | virus |
| E. | None of these |
| Answer» E. None of these | |
| 28. |
Which was the first PC boot sector virus ? |
| A. | Creeper |
| B. | Payload |
| C. | Bomb |
| D. | Brain |
| E. | None of these |
| Answer» E. None of these | |
| 29. |
Which of the following a computer's memory, but unlike a virus, it does not replicate itself ? |
| A. | Trojan horse |
| B. | Logic bomb |
| C. | Cracker |
| D. | Firewall |
| E. | None of these |
| Answer» C. Cracker | |
| 30. |
A program designed to destroy data on your computer which can travel to "infect" other computers is called a |
| A. | disease |
| B. | torpedo |
| C. | hurricane |
| D. | virus |
| E. | infector |
| Answer» E. infector | |
| 31. |
.......are often delivered to a PC through an mail attachment and are often designed to do harm. |
| A. | Portals |
| B. | Spam |
| C. | Viruses |
| D. | Other than those given as options |
| E. | E-mail messages |
| Answer» D. Other than those given as options | |
| 32. |
A computer virus normally attaches itself to another computer program known as a |
| A. | host program |
| B. | target program |
| C. | backdoor program |
| D. | Bluetooth |
| E. | Trojan horse |
| Answer» F. | |
| 33. |
If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of |
| A. | Authentication |
| B. | Automation |
| C. | Firewall |
| D. | Encryption |
| E. | Decryption |
| Answer» B. Automation | |