Computer Security(Computer ) Questions and Answers

Question 1. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _______.
  1.    spammer
  2.    hacker
  3.    instant messenger
  4.    All of these
  5.    None of these
Explanation:-
Answer: Option B. -> hacker
Answer: (b)
A person who uses his or her expertise to gain access to other people's computer information is known as a hacker.

Question 2. A hacker contacts your phone or E-mails and attempts to acquire your password is called
  1.    spoofing
  2.    phishing
  3.    spamming
  4.    bugging
  5.    None of these
Explanation:-
Answer: Option B. -> phishing
Answer: (b)
About Phishing:
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.

Question 3. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage.
  1.    data
  2.    cyber
  3.    Internet
  4.    metaphysical
  5.    publicity
Explanation:-
Answer: Option B. -> cyber
Answer: (b)
What is Cyber security:
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Question 4. Hackers often gain entry to a network be pretending to be at a legitimate computer
  1.    spoofing
  2.    forging
  3.    IP spoofing
  4.    None of these
Explanation:-
Answer: Option C. -> IP spoofing
Answer: (c)
What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, impersonate another computer system or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure.

Question 5. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
  1.    Trojan horses
  2.    Keylogger
  3.    Worm
  4.    Cracker
Explanation:-
Answer: Option A. -> Trojan horses
Answer: (a)
About Trojan Horse: 
A trojan horse is a virus that could fool a user to download and execute them by pretending to be a useful application. Trojan horse was once considered one of the most dangerous computer viruses which can be easily detected by computer users around the world.

Question 6. A time bomb occurs during a particular
  1.    data or time
  2.    logic and data
  3.    only time
  4.    All of the above
  5.    None of these
Explanation:-
Answer: Option C. -> only time
Answer: (c)

Question 7. Security exploit is
  1.    a prepared application that takes advantage of a known weakness.
  2.    a tool used to quickly check computers on a network for known weaknesses.
  3.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  4.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Explanation:-
Answer: Option A. -> a prepared application that takes advantage of a known weakness.
Answer: (a)

Question 8. Spoofing attack is
  1.    an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  2.    a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  3.    a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  4.    None of these
Explanation:-
Answer: Option C. -> a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
Answer: (c)

Question 9. ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
  1.    Stealth
  2.    Polymorphic virus
  3.    Parasitic virus
  4.    Macro virus
  5.    None of these
Explanation:-
Answer: Option A. -> Stealth
Answer: (a)

Question 10. Which one of the following is a cryptographic protocol used to secure http connection ?
  1.    Stream Control Transmission Protocol (SCTP)
  2.    Transport Layer Security (TLS)
  3.    Explicit Congestion Notification (FCN)
  4.    Resource Reservation Protocol (RRP)
  5.    None of the above
Explanation:-
Answer: Option B. -> Transport Layer Security (TLS)
Answer: (b)