Computer Security - Computer Question and Answer

Computer security question with answers - competitive exam 


Computer security question with answers

All competitive exam question with answers 

No: 1

Q. The first computer virus is -------- ?
A. Creeper
No: 2
Q. To protect a computer from virus, you should install -------- in your computer ?
A. antivirus
No: 3
Q. Which of the following is known as Malicious software?
A. malware
No: 4
Q. MCAfee is an example of ?
A. Antivirus
No: 5
Q. A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)
A. Computer Virus
No: 6
Q. When a logic bomb is activated by a time related event, it is known as -------
A. time bomb
No: 7
Q. -------- are often delivered to a PC through an email attachment and are often designed to do harm
A. Virus
No: 8
Q. The altering of data so that it is not usable unless the changes are undone is
A. encryption
No: 9
Q. VIRUS stands for
A. Vital Information Resource Under Slege
No: 10
Q. What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
A. Malware
No: 11
Q. Which of the following is not an antivirus software?
A. Code Red
No: 12
Q. Which of the following is/are threats for electronic payment systems?
A. All of the above
No: 13
Q. A virus that migrates freely within a large population of unauthorized email user is called a -------
A. macro
No: 14
Q. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity
A. Phishing scams
No: 15
Q. Authentication is
A. hard to assure identity of user on a remote system
No: 16
Q. A -------- is a computer program that can replicate itself and spread from one computer to another
A. Computer Virus
No: 17
Q. Which of the following virus overtake computer system, when it boots and destroy information?
A. Stealth virus
No: 18
Q. Key logger is a
A. Spyware
No: 19
Q. To protect yourself from computer hacker, you should turn on a
A. Firewall
No: 20
Q. Firewalls are used to protect against --------
A. unauthorised access
No: 21
Q. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
A. Worm
No: 22
Q. -------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.
A. Antivirus
No: 23
Q. Code red is a(n) ----------
A. Virus
No: 24
Q. Which of the following would most likely not be a symptom of a virus?
A. The CD–ROM stops functioning
No: 25
Q. …………….. are used in denial of service attacks, typically against targeted web sites
A. Zombie
No: 26
Q. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
A. ii, i, iv and iii
No: 27
Q. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect
A. Parasitic Virus
No: 28
Q. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software
A. Stealth virus
No: 29
Q. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns
A. Polymorphic Virus
No: 30
Q. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus
A. mutation engine
No: 31
Q. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code
A. Both i and ii
No: 32
Q. The type(s) of auto executing macros, in Microsoft word is/are
A. All of the above
No: 33
Q. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk
A. Propagation phase
No: 34
Q. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks
A. Zombie
No: 35
Q. What is the name of the Act that governs internet usage in India?
A. The Information Technology Act, 2004
No: 36
Q. All of the following are examples of real security and privacy risks EXCEPT
A. Spam
No: 37
Q. A worm is...
A. Pieces of malicious code that make copies of themselves and spread through computers without human interaction
No: 38
Q. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
A. No
No: 39
Q. Why might someone break into (hack) your computer?
A. All of the above
No: 40
Q. If you receive an email claiming to need your username and/or password, what should you do?
A. Report it as phishing/spam through your email provider 
No: 41
Q. Both email attachments and downloaded files can spread malware
A. TRUE
No: 42
Q. What is the best way to protect your information when you are away from your computer?
A. Lock the computer with a password
No: 43
Q. What is a firewall?
A. A filter for an internet connection that monitors outgoing and incoming activity
No: 44
Q. A strong password should contain
A. At least 8 characters, and a combination of letters, numbers, and characters
No: 45
Q. Social engineering is
A. Scams distributed through email such as phishing, pharming and impersonation
No: 46
Q. What is “Trend Micro”?
A. It is anti-virus software
No: 47
Q. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
A. Trojan horses
No: 48
Q. The virus that spread in application software is called as
A. Macro virus
No: 49
Q. How does a Le-Hard virus come into existence?
A. Command.Com
No: 50
Q. What is the virus that spread in computer?
A. It is a computer program

Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.