Computer Security MCQ PDF. Cyber security Notes, IT Security, Information Security related most important Questions and Answers for competitive exams like IBPS, SBI Bank PO, Clerk, SSC, Railway etc.
Computer Security MCQ PDF
1. It takes advantages of basic hardware and software security characteristics.
(1) System design
(2) Data access control
(3) System access control
(4) None of these
Ans. 1
2. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016]
(1) Authentication
(2) Automation
(3) Firewall
(4) Encryption
(5) None of these
Ans. 1
3. Cracked softwares are another source of
(1) E-mail attack
(2) Virus attack
(3) Trojan horse
(4) All of these
Ans. 2
4. A malware is an
(1) program
(2) hardware
(3) a person
(4) None of these
Ans. 1
5. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
(1) Keylogger
(2) Worm
(3) Virus
(4) Cracker
Ans. 3
6. A computer virus is
(1) deliberately created
(2) created accidently
(3) produced as result of some program error
(4) All of the above
Ans. 1
7. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and downloading software from the Internet? [SBI PO 2014]
(1) Utility
(2) Virus
(3) Honey Pot
(4) Spam
(5) App
Ans. 2
8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a [RBI Grade B 2012]
(1) disease
(2) torpedo
(3) hurricane
(4) virus
(5) infector
Ans. 4
9. Computer virus is [IBPS Clerk 2011]
(1) a hardware
(2) windows tool
(3) a computer program
(4) a system software
(5) None of the above
Ans. 3
10. Which among the following is related to the internet and mail?
(1) Boot-UP
(2) Magnetic Tapes
(3) Applications Software
(4) Paging
(5) Virus
Ans. 5
Computer Security Questions and answers
11. The first PC virus was developed in
(1) 1980
(2) 1984
(3) 1986
(4) 1988
Ans. 3
12. Which virus spreads in application software?
(1) Macro virus
(2) Boot virus
(3) File virus
(4) Antivirus
Ans. 1
13. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
(1) Viruses
(2) Trojan horses
(3) Bots
(4) Worms
Ans. 4
14. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system it propagates through computer networks.
(1) Keylogger
(2) Worm
(3) Cracker
(4) None of these
Ans. 2
15. A worm
(1) can automatically move in network
(2) can only be transferred with human intervention
(3) worms are harmless
(4) None of the above
Ans. 1
16. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or documents.
(1) Self attach
(2) Self-replicating
(3) Non-self-replicating
(4) Hacking
Ans. 2
17. A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]
(1) host program
(2) target program
(3) backdoor program
(4) Bluetooth
(5) Trojan horse
Ans. 5
18. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
(1) Trojan horses
(2) Keylogger
(3) Worm
(4) Cracker
Ans. 1
19. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called
(1) Trojan horses
(2) Keylogger
(3) Worm
(4) Cracker
Ans. 1
20. A ……… is a small program embedded inside of a GIF image.
(1) Web bug
(2) cookie
(3) spyware application
(4) spam
Ans. 3
Computer security MCQ Questions
21. Hackers often gain entry to a network be pretending to be at a legitimate computer
(1) spoofing
(2) forging
(3) IP spoofing
(4) All of these
Ans. 3
22. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
(1) Spoofing attack
(2) Vulnerability scanner
(3) Packet sniffer
(4) Rootkit
Ans. 1
23. Attempt to gain unauthorized access to a user’s system or information by pretending to be the user? [IBPS RRB PO 2018]
(1) Spoofing
(2) Hacker
(3) Cracker
(4) Phishing
(5) None of these
Ans. 1
24. Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014]
(1) Hacker
(2) Spammer
(3) Phish
(4) Identify theft
(5) Cookie
Ans. 1
25. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011]
(1) Spammer
(2) hacker
(3) instant messenger
(4) All of these
(5) None of these
Ans. 2
Computer Security Question
26. Hackers
(1) All have the same motive
(2) are another name of users
(3) Many legally break into computer as long as they do not do any damage
(4) Are people who are allergic to computers
(5) break into other people’s computer
Ans. 5
27. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014] (1) Cyber Terrorist
(2) Black-hat-Hacker
(3) Cyber Cracker
(4) Hacktivist
(5) Other than those given as options
Ans. 3
28. An act of sending e-mails or creating WebPages that are designed to collect and individual’s online bank, credit card or other login information?
(1) Phishing
(2) Spam
(3) Hacking
(4) Cracking
Ans. 1
29. ……… are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011, IBPS Clerk 2013]
(1) Phishing trips
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) Phishing scams
Ans. 1
30. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010]
(1) Spoofing
(2) Phishing
(3) Stalking
(4) Hacking
(5) None of these
Ans. 2
Computer security MCQ PDF
31. All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014]
(1) hackers
(2) spam
(3) viruses
(4) identify theft
(5) None of these
Ans. 2
32. Junk E-mail is also called [Union Bank of India 2011]
(1) spam
(2) spoof
(3) sniffer script
(4) spool
(5) None of these
Ans. 1
33. ……… is a type of electronic spam where unsolicited messages are sent by e-mail.
(1) Trash mail
(2) Cram mail
(3) Draft mail
(4) Spam mail
Ans. 4
34. Adware is something
(1) which is added to your computers
(2) by adding this performance of your computer increases
(3) software that gets different advertisement
(4) None of the above
Ans. 3
35. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
(1) Rootkit
(2) Keylogger
(3) Worm
(4) Cracker
Ans. 1
36. It is a prepared application that takes advantage of a known weakness.
(1) Security exploit
(2) Vulnerability scanner
(3) Packet sniffer
(4) Rootkit
Ans. 1
37. It is a tool used to quickly check computers on a network for known weaknesses.
(1) Security exploit
(2) Vulnerability scanner
(3) Packet sniffer
(4) Rootkit
Ans. 2
38. A ……… is anything that can cause harm.
(1) Vulnerability
(2) phishing
(3) threat
(4) spoof
Ans. 1
39. An antivirus is a (n)
(1) program code
(2) computer
(3) company name
(4) application software
(5) None of these
Ans. 4
40. Antivirus software is an example of
(1) business software
(2) an operating system
(3) a security
(4) an office suite
Ans. 3