Explore topic-wise MCQs in Computer.

This section includes 33 Mcqs, each offering curated multiple-choice questions to sharpen your Computer knowledge and support exam preparation. Choose a topic below to get started.

1.

........ are often delivered to PC through an E-mail attachment and are often designed to do harm.

A. Viruses
B. Spams
C. Portals
D. E-Mail messages
E. None of these
Answer» C. Portals
2.

............. is a form of virus explicitly designed to hide itself from detection by antivirus software.

A. Stealth virus
B. Polymorphic virus
C. Parasitic virus
D. Macro virus
E. None of these
Answer» D. Macro virus
3.

A ............ is anything that can cause harm.

A. vulnerability
B. phishing
C. threat
D. spoof
E. None of these
Answer» B. phishing
4.

A ....... is a small program embedded inside of a GIF image.

A. Web bug
B. cookie
C. spyware application
D. spam
E. None of these
Answer» D. spam
5.

A hacker contacts you phone of E-mail and attempts to acquire your password is called

A. spoofing
B. phishing
C. spamming
D. buging
E. None of these
Answer» C. spamming
6.

Hackers often gain entry to a network be pretending to be att a legitimate computer

A. spoofing
B. forging
C. IP spoofing
D. All of these
E. None of these
Answer» D. All of these
7.

The unautorised real-time interception of a private communication such as a phone call, instant message known as

A. Replay
B. Eavesdropping
C. Patches
D. Payloads
E. None of these
Answer» C. Patches
8.

Which virus spreads in application software ?

A. Macro virus
B. Boot virus
C. File virus
D. Antivirus
E. None of these
Answer» B. Boot virus
9.

What is a person called who uses a computer to cause harm to people or destroy critical systems ?

A. Cyber Terrorist
B. Black-hat-Hacker
C. Cyber Cracker
D. Hacktivist
E. Other than those given as options
Answer» D. Hacktivist
10.

......... refers to the unauthorised copying and distribution of software.

A. Hacking
B. Software piracy
C. Software literacy
D. Cracking
E. Copyright
Answer» C. Software literacy
11.

Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as

A. Mailcious software (malware)
B. adware
C. scareware
D. spyware
E. firewall
Answer» B. adware
12.

All of the following are examples of real-security and privacy risks except

A. hackers
B. spam
C. viruses
D. identify theft
E. None of these
Answer» D. identify theft
13.

Which of the following refers to dangerous programs that can be caught of opening E-mail attachments and downloading software from the Internet ?

A. Utility
B. Virus
C. Honey Pot
D. Spam
E. App
Answer» C. Honey Pot
14.

Which of the following enables to determine how often a user visited a Website ?

A. Hackers
B. Spammers
C. Phish
D. Identity thefts
E. Cookies
Answer» B. Spammers
15.

TO protect yourself from computer hacker intrusions you should install a

A. firwall
B. mailer
C. macro
D. script
E. None of these
Answer» B. mailer
16.

If your computer rebooting itself then it is likely that

A. It has a virus
B. It does not have enough memory
C. There is no printer
D. There has been a power surge
E. It need a CD-ROM
Answer» B. It does not have enough memory
17.

The legal right to use software based on specific restrictions is granted via a

A. software privacy policy
B. software license
C. software password manager
D. software log
E. None of the above
Answer» C. software password manager
18.

........ are attempts by individuals to obtain confidential information from you by falsifying their identity.

A. Phishing trips
B. Computer viruses
C. Spyware scams
D. Viruses
E. Phishing scams
Answer» B. Computer viruses
19.

The ....... of a threat measures its potential impact on a system.

A. vulnerabilities
B. counter measures
C. degree of harm
D. susceptibility
E. None of these
Answer» D. susceptibility
20.

Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ?

A. Spoofing
B. Phishing
C. Stalking
D. Hacking
E. None of these
Answer» C. Stalking
21.

Which one of the following is a key function of firewall ?

A. Monitoring
B. Deleting
C. Copying
D. Moving
E. None of these
Answer» B. Deleting
22.

A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a

A. spammer
B. hacker
C. instant messenger
D. All of these
E. None of these
Answer» C. instant messenger
23.

Vendor created program modifications are called

A. patches
B. antiviruses
C. hales
D. fixes
E. overlaps
Answer» B. antiviruses
24.

........ is the process of finding errors in software code ?

A. Compiling
B. Testing
C. Running
D. Debugging
E. None of the above
Answer» E. None of the above
25.

Which one of the following is a cryptographic protocol used to secure http connections ?

A. Stream Control Transmission Protocol (SCTP)
B. Transport Layer Security (TLS)
C. Explicit Congestion Notification (ECN)
D. Resource Reservation Protocol (RRP)
E. None of the above
Answer» C. Explicit Congestion Notification (ECN)
26.

A firewall operated by

A. the pre-purchase phase
B. isolating intranet from extranet
C. screening packets to/from the network and provide controllable filtering of network traffic
D. All of the above
E. None of the above
Answer» D. All of the above
27.

A program designed to designed to destroy data on your computer which can travel to infect other computers, is called a

A. disease
B. tarpedo
C. hurricave
D. virus
E. None of these
Answer» E. None of these
28.

Which was the first PC boot sector virus ?

A. Creeper
B. Payload
C. Bomb
D. Brain
E. None of these
Answer» E. None of these
29.

Which of the following a computer's memory, but unlike a virus, it does not replicate itself ?

A. Trojan horse
B. Logic bomb
C. Cracker
D. Firewall
E. None of these
Answer» C. Cracker
30.

A program designed to destroy data on your computer which can travel to "infect" other computers is called a

A. disease
B. torpedo
C. hurricane
D. virus
E. infector
Answer» E. infector
31.

.......are often delivered to a PC through an mail attachment and are often designed to do harm.

A. Portals
B. Spam
C. Viruses
D. Other than those given as options
E. E-mail messages
Answer» D. Other than those given as options
32.

A computer virus normally attaches itself to another computer program known as a

A. host program
B. target program
C. backdoor program
D. Bluetooth
E. Trojan horse
Answer» F.
33.

If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of

A. Authentication
B. Automation
C. Firewall
D. Encryption
E. Decryption
Answer» B. Automation