Home
10th Grade
11th And 12th
11th Grade
12th Grade
3rd Grade
4th Grade
5th Grade
6th Grade
7th Grade
8th Grade
9th Grade
Advance Accountancy
Auditing
Computer Aptitude
Direct And Indirect Taxation
Exams
General Hindi
Indian Finance System
Information Technology And Application In Business
Macro Economics
Town Planning
Aerospace And Aeronautical
Analytical Instrumentation
Banking Awareness
Banking Exam
Biochemistry
Bioinformatics
Biology
Biotechnology
Business Statistics
C Program
C Programming
C++ Programming
Career Aptitude Test
Cell Biology
Central Superior Service (css)
Chemical Engineering
Chemistry
Civil Engineering
Commerce
Computer
Computer Fundamentals
Computer Science
Cost Accounting
Css
Database
Drug And Pharmaceutical Biotechnology
Ecat And Mcat Entry Test
Economics
Electrical Engineering
Electrical Engineering Questions
Electrical Measurement And Instrumentation
Engineering
English
English Literature
Environment Management
Environmental Biotechnology
Enzyme Technology
Financial Management And Financial Markets
Gate
General Knowledge
Graduate Assessment Test (gat)
Health And Physical
Heat Transfer
Html
Human Anatomy And Physiology
Human And Cultural Diversity
Human Resource Management
Ias
Indian Economy
Indian Economy
Indian General Awareness
Indian Geography
Indian Geography
Indian History
Indian History
Indian Polity
Instrumentation Transducers
International Relations
Java Program
Javascript
Judiciary And Law
Life Sciences
Management
Marketing And Marketing Management
Mass Transfer
Mechanical Engineering
Mechanics Of Materials
Medical Subjects
Microbiology
Networking
Php
Placement Tests
Professional Communication
Quantitative Aptitude
Reasoning Aptitude
Renewable Energy
Science
Sociology
Sql
Surveying
Total Quality Management
Uidai Aadhaar Supervisor Certification
Virology
Notificatin
Exam
Blog
Contact Us
Information Security(Computer Science ) Questions and Answers
Home
Topic
Computer Science
Information Security
Question 1.
In what year does creeper was changed to reaper?
1960s
1970s
1990s
2010s
Explanation:-
Answer: Option B. ->
1970s
Question 2.
Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?
keylogger -hardware
Site:hardware keylogger
keylogger +hardware
keylogger -software +hardware
Explanation:-
Answer: Option D. ->
keylogger -software +hardware
Question 3.
What does 'integrity of data' mean?
"Accuracy and completeness of the data"
"Data should be viewable at all times"
"Data should be access by only the right people"
"None of the above"
Explanation:-
Answer: Option A. ->
"Accuracy and completeness of the data"
Question 4.
A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file
false positive
false negative
true positive
true negative
Explanation:-
Answer: Option A. ->
false positive
Question 5.
Which best describes the results of the following search-engine query:World cup soccer -England
Search results show only world-cup soccer links to the England team
Search results show world-cup soccer prioritizing links for the England team
Search results show world-cup soccer omitting references to the England team
Search results show world-cup soccer deprioritizing links to the England
Explanation:-
Answer: Option C. ->
Search results show world-cup soccer omitting references to the England team
Question 6.
Type of malware that inserts snippets of code inside Microsoft Office type files
Logic Bomb
Worm
Rootkit
Macro virus
Explanation:-
Answer: Option D. ->
Macro virus
Question 7.
Which of the following is true aboutphishing?
Phishing is an act of catching fish for dinner.
Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.
Phishing is forgetting your password andcontacting IT to reset.
Phishing is a virus that will not allow you tolog onto your computer.
Explanation:-
Answer: Option B. ->
Phishing is an attemptto acquire sensitive information such as passwords for malicious reasons.
Question 8.
What is one way that you can preventidentity theft?
Maxing out your credit card
Throwing personal documents away withoutshredding them
Opening several accounts
Examining bank accountson a regular basis
Explanation:-
Answer: Option D. ->
Examining bank accountson a regular basis
Question 9.
Which security principles are covered by the CIA triad?
certified, integrated, accessible
continuity, integrity, accessibility
confidentiality, integrity, availability
confidentiality, installation, assembly
Explanation:-
Answer: Option C. ->
confidentiality, integrity, availability
Question 10.
Which is an example of PII? (Personally Identifiable Information)
Credit Card Number
Name
Home Address
All of the above
Explanation:-
Answer: Option D. ->
All of the above
1
2
3
Next →
One click Login
Login With Google
Old way of Login
Login With Email