Explore topic-wise MCQs in Bachelor of Computer Applications (BCA).

This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Computer Applications (BCA) knowledge and support exam preparation. Choose a topic below to get started.

1.

This technology is used to measure and analyze human body characteristics for authentication purposes.

A. Footprinting
B. Biometrics
C. JBOD
D. Anthropomorphism
Answer» C. JBOD
2.

This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

A. ERM group
B. Computer emergency response tea
C. Tiger team
D. Silicone cockroach
Answer» D. Silicone cockroach
3.

This is a program in which harmful code is contained inside apparently harmless programming or data.

A. Snort
B. Honeypot
C. Blue bomb
D. Trojan horse
Answer» E.
4.

This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.

A. PCMCIA card
B. Smart card
C. Server accelerator card
D. Network interface card
Answer» D. Network interface card
5.

___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.

A. Reverse engineering
B. Magneto resistive head technology
C. Van Eck phreaking
D. Electronic data processing (EDP)
Answer» D. Electronic data processing (EDP)
6.

This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

A. Identity theft
B. Cookie poisoning
C. Shoulder surfing
D. Relative identifier
Answer» C. Shoulder surfing
7.

This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.

A. Trojan horse
B. Hashing
C. Switching fabric
D. Cut and paste attack
Answer» E.
8.

The developers of an operating system or vendor application might issue this to prevent intruders from taking advantage of a weakness in their programming.

A. Cookie
B. Key fob
C. Watermark
D. Patch
Answer» E.
9.

Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations.

A. DS
B. OCSP
C. Secure HTTP
D. Pretty Good Privacy
Answer» E.
10.

What "layer" of an e-mail message should you consider when evaluating e-mail security?

A. TCP/IP
B. SMTP
C. Body
D. All of the above
Answer» E.
11.

An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

A. Passphrase
B. Root kit
C. Ownership tag
D. Token
Answer» C. Ownership tag
12.

This is an attack on a computer system that takes advantage of a particular vulnerability that the system offers to intruders.

A. Port scan
B. Denial of service
C. Exploit
D. Logic bomb
Answer» D. Logic bomb
13.

This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

A. Hijacking
B. Identity theft
C. Smurf attack
D. Tunneling
Answer» B. Identity theft
14.

Today, many Internet businesses and users take advantage of cryptography based on this approach.

A. Public key infrastructure
B. Output feedback
C. Encrypting File System
D. Single sign on
Answer» B. Output feedback
15.

This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

A. Foot printing
B. Non repudiation
C. E-mail spoofing
D. Finger
Answer» D. Finger
16.

This type of intrusion relies on the intruder's ability to trick people into breaking normal security procedures.

A. Shoulder surfing
B. Hijacking
C. Brain fingerprinting
D. Social engineering
Answer» E.
17.

This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

A. Foot printing
B. Hash function
C. Watermark
D. Electronic Code Book
Answer» E.
18.

This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.

A. Private key
B. Digital certificate
C. Smart card
D. Ownership tag
Answer» C. Smart card
19.

This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

A. Chaffing and winnowing
B. Cryptanalysis
C. Serendipity
D. Brute force cracking
Answer» E.
20.

This is an encryption/decryption key known only to the party or parties that exchange secret messages.

A. E-signature
B. Digital certificate
C. Private key
D. Security token
Answer» D. Security token
21.

This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination.

A. Secret key algorithm
B. Message queuing
C. Spyware
D. Steganography
Answer» E.
22.

An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

A. Inspection of password files to detect inadvisable passwords
B. Mechanisms put in place to reenact known methods of attack and record system responses
C. Inspection of system to detect policy violations
D. Inspection of configuration files to detect inadvisable settings
Answer» C. Inspection of system to detect policy violations
23.

"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers?

A. Application layer
B. Network layer
C. Session layer
D. Both a and c
Answer» E.
24.

One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?

A. Inside the firewall
B. Outside the firewall
C. Both
D. None
Answer» B. Outside the firewall
25.

In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?

A. Cross-site scripting
B. Command injection
C. SQL injection
D. Buffer overflow
Answer» D. Buffer overflow