Explore topic-wise MCQs in Computer Science.

This section includes 46 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

These hacker breaks security for altruistic or at least non-malicious reasons.

A. White hat
B. Grey hat
C. Blue hat
D. None of these
Answer» B. Grey hat
2.

Black hat is

A. someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others.
C. hacker who utilizes technology to announce a political message.
D. None of these
Answer» B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others.
3.

A vulnerability scanner is

A. a prepared application that takes advantage of a known weakness.
B. a tool used to quickly check computers on a network for known weaknesses.
C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer» C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
4.

It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» B. vulnerability scanner
5.

A spoofing attack is

A. a prepared application that takes advantage of a known weakness.
B. a tool used to quickly check computers on a network for known weaknesses.
C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer» E.
6.

A packet sniffer is

A. a prepared application that takes advantage of a known weakness.
B. a tool used to quickly check computers on a network for known weaknesses.
C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer» D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
7.

Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

A. Trojan horses
B. Keylogger
C. Worm
D. Cracker
Answer» B. Keylogger
8.

Script kiddie is

A. someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others.
C. hacker who utilizes technology to announce a political message.
D. None of these
Answer» C. hacker who utilizes technology to announce a political message.
9.

It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

A. Rootkit
B. Keylogger
C. Worm
D. Cracker
Answer» B. Keylogger
10.

It is a tool used to quickly check computers on a network for known weaknesses.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» C. packet sniffer
11.

Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.

A. Keylogger
B. Worm
C. Cracker
D. None of these
Answer» C. Cracker
12.

Blue hat is

A. hacker breaks security for altruistic or at least non-malicious reasons.
B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos
Answer» D.
13.

White hat is

A. hacker breaks security for altruistic or at least non-malicious reasons.
B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos
Answer» B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
14.

Rootkit is

A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
D. None of these
Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
15.

It is a prepared application that takes advantage of a known weakness.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» B. vulnerability scanner
16.

It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» D. rootkit
17.

Hacktivism is

A. someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others.
C. hacker who utilizes technology to announce a political message.
D. None of these
Answer» D. None of these
18.

Packet Sniffer is

A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
D. None of these
Answer» B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
19.

It is a software program designed to record (‘log’) every keystroke on the machine on which it runs

A. Keylogger
B. Worm
C. Virus
D. Cracker
Answer» B. Worm
20.

Security exploit is

A. a prepared application that takes advantage of a known weakness.
B. a tool used to quickly check computers on a network for known weaknesses.
C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer» B. a tool used to quickly check computers on a network for known weaknesses.
21.

Grey hat is

A. hacker breaks security for altruistic or at least non-malicious reasons.
B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos
Answer» C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos
22.

Spoofing attack is

A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
D. None of these
Answer» D. None of these
23.

These are program designed as to seem to being or be doing one thing, but actually being or doing another.

A. Trojan horses
B. Keylogger
C. Worm
D. Cracker
Answer» B. Keylogger
24.

This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

A. White hat
B. Grey hat
C. Blue hat
D. None of these
Answer» C. Blue hat
25.

This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

A. White hat
B. Grey hat
C. Blue hat
D. None of these
Answer» D. None of these
26.

If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of  [IBPS PO 2016]

A. Authentication
B. Automation
C. Firewall
D. Encryption
E. Decryption
Answer» B. Automation
27.

A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]

A. host program
B. target program
C. backdoor program
D. Bluetooth
E. Trojan horse
Answer» F.
28.

...... are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015]

A. Portals
B. Spam
C. Viruses
D. Other than those given as options
E. E-mail messages
Answer» D. Other than those given as options
29.

The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012]

A. software privacy policy
B. software license
C. software password manager
D. software log
E. None of the above
Answer» C. software password manager
30.

To protect yourself from computer hacker intrusions you should install a [RBI Grade B 2012]

A. firewall
B. mailer
C. macro
D. script
E. None of these
Answer» B. mailer
31.

Viruses, trojan horses and worms are [IBPS Clerk 2012]

A. able to harm computer system
B. unable to detect if present on computer
C. user-friendly applications
D. harmless applications resident on computer
E. None of the above
Answer» B. unable to detect if present on computer
32.

The ......... of a threat measures its potential impact on a system.   [IBPS Clerk 2011]

A. vulnerabilities
B. counter measures
C. degree of harm
D. susceptibility
E. None of these
Answer» D. susceptibility
33.

Vendor created program modifications are called [Allahabad Bank PO 2011]

A. patches
B. antiviruses
C. hales
D. fixes
E. overlaps
Answer» B. antiviruses
34.

A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011]

A. spammer
B. hacker
C. instant messenger
D. All of these
E. None of these
Answer» C. instant messenger
35.

 ......... is the process of finding errors in software code?

A. Compiling
B. Testing
C. Running
D. Debugging
E. None of the above
Answer» E. None of the above
36.

It is the process of finding errors in software code

A. Debugging
B. Compiling
C. Testing
D. All of these
E. None of these
Answer» E. None of these
37.

There are viruses that are triggered by the passage of time or on a certain date.

A. Boot-sector viruses
B. Macro viruses
C. Time bombs
D. Worms
E. None of these
Answer» D. Worms
38.

A program designed to destroy data on your computer which can travel to infect other computers, is called a

A. disease
B. tarpedo
C. hurricave
D. virus
E. None of these
Answer» E. None of these
39.

Antivirus software is an example of

A. business software
B. an operating system
C. a security
D. an office suite
E. None of the above
Answer» D. an office suite
40.

Password enables users to

A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structure
E. None of the above
Answer» D. simplify file structure
41.

A hacker contacts your phone or E-mails and attempts to acquire your password is called

A. spoofing
B. phishing
C. spamming
D. bugging
E. None of these
Answer» C. spamming
42.

A ......... is a small program embedded inside of a GIF image.

A. Web bug
B. cookie
C. spyware application
D. spam
E. None of these
Answer» D. spam
43.

A ......... is anything that can cause harm.

A. vulnerability
B. phishing
C. threat
D. spoof
E. None of these
Answer» B. phishing
44.

......... are often delivered to PC through an E-mail attachment and are often designed to do harm.

A. Viruses
B. Spams
C. Portals
D. E-mail messages
E. None of these
Answer» C. Portals
45.

The first computer virus is

A. creeper
B. PARAM
C. the famous
D. HARLIE
E. None of these
Answer» B. PARAM
46.

Abuse messaging systems to send unsolicited is

A. phishing
B. spam
C. malware
D. firewall
E. adware
Answer» C. malware