Computer Security G.K. Multiple Choice Questions With Answers

computer security gk questions eduhyme

It is a branch of technology known as information security as applied to computers. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

1. It is a prepared application that takes advantage of a known weakness :

  1. security exploit
  2. vulnerability scanner
  3. packet sniffer
  4. rootkit

Correct Answer – A

2. It is a tool used to quickly check computers on a network for known weakness:

  1. security exploit
  2. vulnerability scanner
  3. packet sniffer
  4. rootkit

Correct Answer – B

3. It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computers or over the network:

  1. Security exploit
  2. Vulnerability scanner
  3. Packet sniffer
  4. Rootkit

Correct Answer – C

4. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access:

  1. Spoofing attack
  2. Vulnerability scanner
  3. Packet sniffer
  4. Rootkit

Correct Answer – A

5. These hacker breaks security for altruistic or at least non malicious reasons:

  1. White hat
  2. Grey hat
  3. Blue hat
  4. None of these

Correct Answer – A

6. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted:

  1. Whit hat
  2. Grey hat
  3. Blue hat
  4. None of these

Correct Answer – B

7. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed:

  1. White hat
  2. Grey hat
  3. Blue hat
  4. None of these

Correct Answer – C

8. It is a software program designed to record (‘log’) every keystroke on the machine on which it runs :

  1. Keylogger
  2. Worm
  3. Virus
  4. Cracker

Correct Answer – A

9. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents:

  1. Keylogger
  2. Worm
  3. Virus
  4. Cracker

Correct Answer – C

10. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer network:

  1. Keylogger
  2. Worm
  3. Cracker
  4. None of these

Correct Answer – B

11. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called:

  1. Trojan horses
  2. Keylogger
  3. Worm
  4. Cracker

Correct Answer – A

12. These are program designed as to seem to being or be doing one thing, but actually being or doing another:

  1. Trojan horses
  2. Keylogger
  3. Worm
  4. Cracker

Correct Answer – A

13. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators:

  1. Rootkit
  2. Keylogger
  3. Worm
  4. Cracker

Correct Answer – A

14. Packet Sniffer is :

  1. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the network.
  2. a situation in which one person or program successfully masquerades as another by falsifying data and
    thereby gaining illegitimate access.
  3. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description
    of a set of programs which work to subvert control of an operating system from its legitimate (in accordance
    with established rules) operators.
  4. none of these

Correct Answer – A

15. Rootkit is :

  1. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the work.
  2. A situation in which one person or program successfully masquerades as another by falsifying data and
    thereby gaining illegitimate access.
  3. A toolkit for hiding the fact that a computer’s security has been compromised, is a general description
    of a set of programs which work to subvert control of an operating system from its legitimate (in accordance
    with established rules) operators.
  4. none of these.

Correct Answer – B

16. Spoofing attack is :

  1. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the network.
  2. a situation in which one person or program successfully masquerades as another by falsifying data gaining
    illegitimate access.
  3. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description
    of a set of programs which work of subvert control of an operating system from its legitimate (in accordance
    with established rules) operators.
  4. none of these

Correct Answer – C

17. Security exploit is :

  1. a prepared application that takes advantage of a known weakness.
  2. a tool used to quickly check computers on a network for weakness.
  3. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the network.
  4. a situation in which one person or program successfully masquerades as another by falsifying data and
    thereby gaining illegitimate access.

Correct Answer – A

18.

  1. A prepared application that takes advantage of a known weakness
  2. a tool used to quickly check computers on a network for known weaknesses
  3. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the network.
  4. a situation in which one person or program successfully masquerades as another by falsifying data and
    thereby gaining illegitimate access.

Correct Answer – B

19. A packet sniffer is :

  1. a prepared application that takes advantage of a known weakness.
  2. a tool used to quickly check computers on a network for known weakness.
  3. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and
    other data while it is in transit either within the computer or over the network.
  4. a situation in which one person or program successfully masquerades as another by falsifying data and
    thereby gaining illegitimate access.

Correct Answer – C

20. White hat is :

  1. hacker breaks security for altruistic or at least non-malicious reasons.
  2. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  3. someone outside computer security consulting firms that are used to bug test a system prior to its launch,
    looking for exploits so they can be closed.
  4. none of these

Correct Answer – A

21. In which among the following statutes the words “Cyber Crime” has been defined ?

  1. information Technology
  2. Indian Penal Code
  3. Copyright
  4. None of the above

Correct Answer – D

22. ‘Cyber Crime’ relates to

  1. Computer
  2. Internet
  3. E-mail
  4. All of the above

Correct Answer – D

23. “Cyber Crime” Includes

  1. security or financial crime
  2. pornography
  3. on-line gambling and cyber terrorism
  4. all of the above

Correct Answer – D

24. Causes of Cyber Crime include

  1. easy access to computer network
  2. negligence of victims to safety of their data
  3. complexity of data in operating system
  4. all of the above

Correct Answer – D

25. What is/are ways of committing the offence of “Cyber Crime”?

  1. Unauthorized access to computer systems or hacking
  2. E-mail gambling
  3. Virus attacks
  4. All of the above

Correct Answer – D

26. What is/are classification of cyber crime ?

  1. Harassment via e-mail
  2. Cyber stalking
  3. Dissemination obscene material
  4. All of the above

Correct Answer – D

27. What is/are cyber crime against Government ?

  1. Cyber terrorism
  2. Distribution of pirated software
  3. Hacking of unauthorized secret information
  4. All of the above

Correct Answer – D

28. What are statutes to combat cyber crime ?

  1. Information Technology Act
  2. Indian Penal Code
  3. Copyright Act
  4. All of the above

Correct Answer – D

29, What is the meaning of “Cyber Security”?

  1. Protecting information in computer
  2. Protecting computer equipment devices or communications
  3. Protecting the computer or network access
  4. All of the above

Correct Answer – D

30. The Information Technology (Amendment) Act 2008 strengthened the law to combat cyber crime. On which date such Amendment Act came into force ?

  1. 27 October, 2009
  2. 27 October, 2008
  3. 17 October, 2009
  4. 17 October, 2008

Correct Answer – A

31. Grey hat is :

  1. hacker breaks security for altruistic or at least non-malicious reasons.
  2. hacker of ambiguous ethics and/ or borderline legality, often frankly admitted.
  3. someone outside computer security consulting firms that are used to bug test a system prior to its launch
    looking for exploits so they can be closed.
  4. none of the above

Correct Answer – B

32. Blue Hat is :

  1. hacker breaks security for altruistic or at least non-malicious reasons.
  2. hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  3. someone outside computer security consulting firms that are used to bug test a system prior to its launch,
    looking for exploits so they can be closed.
  4. None of these.

Correct Answer – C

33. Black hat is :

  1. (a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identify theft, intellectual property theft, or many other types of crime.
  2. a person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
  3. hacker who utilizes technology to announce a political message.
  4. None of these

Correct Answer – A

Leave a Reply