Computer Security MCQ PDF [Competitive Questions and answer]

Computer Security MCQ PDF. Cyber security Notes, IT Security, Information Security related most important Questions and Answers for competitive exams like IBPS, SBI Bank PO, Clerk, SSC, Railway etc.

Computer Security MCQ PDF

1. It takes advantages of basic hardware and software security characteristics.

(1) System design           

(2) Data access control  

(3) System access control            

(4) None of these

Ans. 1

2. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016]

(1) Authentication          

(2) Automation                                

(3) Firewall         

(4) Encryption   

(5) None of these

Ans. 1

3. Cracked softwares are another source of

(1) E-mail attack               

(2) Virus attack 

(3) Trojan horse              

(4) All of these

Ans. 2

4. A malware is an

(1) program

(2) hardware

(3) a person

(4) None of these

Ans. 1

5. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(1) Keylogger

(2) Worm

(3) Virus

(4) Cracker

Ans. 3

 6. A computer virus is

(1) deliberately created

(2) created accidently

(3) produced as result of some program error

(4) All of the above

Ans. 1

7. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and downloading software from the Internet? [SBI PO 2014]

(1) Utility

(2) Virus

(3) Honey Pot

(4) Spam

(5) App

Ans. 2

8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a [RBI Grade B 2012]

(1) disease

(2) torpedo

(3) hurricane

(4) virus

(5) infector

Ans. 4

 9. Computer virus is [IBPS Clerk 2011]

(1) a hardware

(2) windows tool

(3) a computer program

(4) a system software

(5) None of the above

Ans. 3

10. Which among the following is related to the internet and mail?

(1) Boot-UP

(2) Magnetic Tapes

(3) Applications Software

(4) Paging

(5) Virus

Ans. 5

Computer Security Questions and answers

11. The first PC virus was developed in

(1) 1980

(2) 1984

(3) 1986

(4) 1988

Ans. 3

12. Which virus spreads in application software?

(1) Macro virus

(2) Boot virus

(3) File virus

(4) Antivirus

Ans. 1

13. Which of the following is the type of software that has self-replicating software that causes damage to files and system?

(1) Viruses

(2) Trojan horses

(3) Bots

(4) Worms

Ans. 4

14. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system it propagates through computer networks.

(1) Keylogger

(2) Worm

(3) Cracker

(4) None of these

Ans. 2

15. A worm

(1) can automatically move in network

(2) can only be transferred with human intervention

(3) worms are harmless

(4) None of the above

Ans. 1

16. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(1) Self attach

(2) Self-replicating

(3) Non-self-replicating

(4) Hacking

Ans. 2

17. A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]

(1) host program

(2) target program

(3) backdoor program

(4) Bluetooth

(5) Trojan horse

Ans. 5

18. These are program designed as to seem to being or be doing one thing, but actually being or doing another.

(1) Trojan horses

(2) Keylogger

(3) Worm

(4) Cracker

Ans. 1

19. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called

(1) Trojan horses

(2) Keylogger

(3) Worm

(4) Cracker

Ans. 1

20. A ……… is a small program embedded inside of a GIF image.

(1) Web bug

(2) cookie

(3) spyware application

(4) spam

Ans. 3

Computer security MCQ Questions

21. Hackers often gain entry to a network be pretending to be at a legitimate computer

(1) spoofing

(2) forging

(3) IP spoofing

(4) All of these

Ans. 3

22. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

(1) Spoofing attack

(2) Vulnerability scanner

(3) Packet sniffer

(4) Rootkit

Ans. 1

23. Attempt to gain unauthorized access to a user’s system or information by pretending to be the user? [IBPS RRB PO 2018]

(1) Spoofing

(2) Hacker

(3) Cracker

(4) Phishing

(5) None of these

Ans. 1

24. Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014]

(1) Hacker

(2) Spammer

(3) Phish

(4) Identify theft

(5) Cookie

Ans. 1

25. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011]

(1) Spammer

(2) hacker

(3) instant messenger

(4) All of these

(5) None of these

Ans. 2

Computer Security Question

26. Hackers

(1) All have the same motive

(2) are another name of users

(3) Many legally break into computer as long as they do not do any damage

(4) Are people who are allergic to computers

(5) break into other people’s computer

Ans. 5

27. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014] (1) Cyber Terrorist

(2) Black-hat-Hacker

(3) Cyber Cracker

(4) Hacktivist

(5) Other than those given as options

Ans. 3

28. An act of sending e-mails or creating WebPages that are designed to collect and individual’s online bank, credit card or other login information?

(1) Phishing

(2) Spam

(3) Hacking

(4) Cracking

Ans. 1

29. ……… are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011, IBPS Clerk 2013]

(1) Phishing trips

(2) Computer viruses

(3) Spyware scams

(4) Viruses

(5) Phishing scams

Ans. 1

30. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010]

(1) Spoofing

(2) Phishing

(3) Stalking

(4)  Hacking

(5) None of these

Ans. 2

Computer security MCQ PDF

31. All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014]

(1) hackers

(2) spam

(3) viruses

(4) identify theft

(5) None of these

Ans. 2

32. Junk E-mail is also called [Union Bank of India 2011]

(1) spam

(2) spoof

(3) sniffer script

(4) spool

(5) None of  these

Ans. 1

33. ……… is a type of electronic spam where unsolicited messages are sent by e-mail.

(1) Trash mail    

(2) Cram mail    

(3) Draft mail     

(4) Spam mail

Ans. 4

34. Adware is something

(1) which is added to your computers                    

(2) by adding this performance of your computer increases

(3) software that gets different advertisement

(4) None of the above

Ans. 3

35. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

(1) Rootkit

(2) Keylogger

(3) Worm

(4) Cracker

Ans. 1

36. It is a prepared application that takes advantage of a known weakness.

(1) Security exploit

(2) Vulnerability scanner

(3) Packet sniffer

(4) Rootkit

Ans. 1

37. It is a tool used to quickly check computers on a network for known weaknesses.

(1) Security exploit

(2) Vulnerability scanner

(3) Packet sniffer

(4) Rootkit

Ans. 2

 38. A ……… is anything that can cause harm.

(1) Vulnerability

(2) phishing

(3) threat

(4) spoof

Ans. 1

 39. An antivirus is a (n)

(1) program code

(2) computer

(3) company name

(4) application software

 (5) None of these

Ans. 4

 40. Antivirus software is an example of

(1) business software

(2) an operating system

(3) a security

(4) an office suite

Ans. 3

Computer security MCQ PDF [Download] 60 Question + Notes
Cyber Security MCQ with Answers PDF [285 Important Questions]
MCQ on Virus and Antivirus [PDF]
Computer GK [10000 MCQ PDF] Questions for Competitive Exams