

MCQOPTIONS
Saved Bookmarks
This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
These hacker breaks security for altruistic or at least non-malicious reasons. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» B. Grey hat | |
2. |
Black hat is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. | |
3. |
A vulnerability scanner is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. | |
4. |
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» B. vulnerability scanner | |
5. |
A spoofing attack is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» E. | |
6. |
A packet sniffer is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. | |
7. |
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called? |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» B. Keylogger | |
8. |
Script kiddie is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» C. hacker who utilizes technology to announce a political message. | |
9. |
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
A. | Rootkit |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» B. Keylogger | |
10. |
It is a tool used to quickly check computers on a network for known weaknesses. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» C. packet sniffer | |
11. |
Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks. |
A. | Keylogger |
B. | Worm |
C. | Cracker |
D. | None of these |
Answer» C. Cracker | |
12. |
Blue hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» D. | |
13. |
White hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted. | |
14. |
Rootkit is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. | |
15. |
It is a prepared application that takes advantage of a known weakness. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» B. vulnerability scanner | |
16. |
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» D. rootkit | |
17. |
Hacktivism is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» D. None of these | |
18. |
Packet Sniffer is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. | |
19. |
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs |
A. | Keylogger |
B. | Worm |
C. | Virus |
D. | Cracker |
Answer» B. Worm | |
20. |
Security exploit is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» B. a tool used to quickly check computers on a network for known weaknesses. | |
21. |
Grey hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos | |
22. |
Spoofing attack is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» D. None of these | |
23. |
These are program designed as to seem to being or be doing one thing, but actually being or doing another. |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» B. Keylogger | |
24. |
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» C. Blue hat | |
25. |
This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» D. None of these | |
26. |
If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016] |
A. | Authentication |
B. | Automation |
C. | Firewall |
D. | Encryption |
E. | Decryption |
Answer» B. Automation | |
27. |
A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015] |
A. | host program |
B. | target program |
C. | backdoor program |
D. | Bluetooth |
E. | Trojan horse |
Answer» F. | |
28. |
...... are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015] |
A. | Portals |
B. | Spam |
C. | Viruses |
D. | Other than those given as options |
E. | E-mail messages |
Answer» D. Other than those given as options | |
29. |
The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012] |
A. | software privacy policy |
B. | software license |
C. | software password manager |
D. | software log |
E. | None of the above |
Answer» C. software password manager | |
30. |
To protect yourself from computer hacker intrusions you should install a [RBI Grade B 2012] |
A. | firewall |
B. | mailer |
C. | macro |
D. | script |
E. | None of these |
Answer» B. mailer | |
31. |
Viruses, trojan horses and worms are [IBPS Clerk 2012] |
A. | able to harm computer system |
B. | unable to detect if present on computer |
C. | user-friendly applications |
D. | harmless applications resident on computer |
E. | None of the above |
Answer» B. unable to detect if present on computer | |
32. |
The ......... of a threat measures its potential impact on a system. [IBPS Clerk 2011] |
A. | vulnerabilities |
B. | counter measures |
C. | degree of harm |
D. | susceptibility |
E. | None of these |
Answer» D. susceptibility | |
33. |
Vendor created program modifications are called [Allahabad Bank PO 2011] |
A. | patches |
B. | antiviruses |
C. | hales |
D. | fixes |
E. | overlaps |
Answer» B. antiviruses | |
34. |
A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011] |
A. | spammer |
B. | hacker |
C. | instant messenger |
D. | All of these |
E. | None of these |
Answer» C. instant messenger | |
35. |
......... is the process of finding errors in software code? |
A. | Compiling |
B. | Testing |
C. | Running |
D. | Debugging |
E. | None of the above |
Answer» E. None of the above | |
36. |
It is the process of finding errors in software code |
A. | Debugging |
B. | Compiling |
C. | Testing |
D. | All of these |
E. | None of these |
Answer» E. None of these | |
37. |
There are viruses that are triggered by the passage of time or on a certain date. |
A. | Boot-sector viruses |
B. | Macro viruses |
C. | Time bombs |
D. | Worms |
E. | None of these |
Answer» D. Worms | |
38. |
A program designed to destroy data on your computer which can travel to infect other computers, is called a |
A. | disease |
B. | tarpedo |
C. | hurricave |
D. | virus |
E. | None of these |
Answer» E. None of these | |
39. |
Antivirus software is an example of |
A. | business software |
B. | an operating system |
C. | a security |
D. | an office suite |
E. | None of the above |
Answer» D. an office suite | |
40. |
Password enables users to |
A. | get into the system quickly |
B. | make efficient use of time |
C. | retain confidentiality of files |
D. | simplify file structure |
E. | None of the above |
Answer» D. simplify file structure | |
41. |
A hacker contacts your phone or E-mails and attempts to acquire your password is called |
A. | spoofing |
B. | phishing |
C. | spamming |
D. | bugging |
E. | None of these |
Answer» C. spamming | |
42. |
A ......... is a small program embedded inside of a GIF image. |
A. | Web bug |
B. | cookie |
C. | spyware application |
D. | spam |
E. | None of these |
Answer» D. spam | |
43. |
A ......... is anything that can cause harm. |
A. | vulnerability |
B. | phishing |
C. | threat |
D. | spoof |
E. | None of these |
Answer» B. phishing | |
44. |
......... are often delivered to PC through an E-mail attachment and are often designed to do harm. |
A. | Viruses |
B. | Spams |
C. | Portals |
D. | E-mail messages |
E. | None of these |
Answer» C. Portals | |
45. |
The first computer virus is |
A. | creeper |
B. | PARAM |
C. | the famous |
D. | HARLIE |
E. | None of these |
Answer» B. PARAM | |
46. |
Abuse messaging systems to send unsolicited is |
A. | phishing |
B. | spam |
C. | malware |
D. | firewall |
E. | adware |
Answer» C. malware | |