Welcome to Computer Security GK Questions Section. This section is a category-wise archive of Computer Security GK Questions – 2021-22 in MCQs format on various subjects and states. This section is suitable for aspirants preparing for SSC-CGL and State Level Examinations of various states and also UPSC conducted NDA/ CDS/ IFS/ IES / CSE etc. examinations.
Q.1. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
a) Keylogger
b) Worm
c) Virus
d) Cracker
e) None of the above
Above
Q.2. Which one of the following is a key function of firewall?
a) Monitoring
b) Deleting
c) Copying
d) Moving
e) None of these
a) Monitoring
Q.3. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a _.
a) spammer
b) hacker
c) instant messenger
d) All of these
e) None of these
b) hacker
Q.4. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
a) hacker
b) analyst
c) instant messenger
d) programmer
e) spammer
a) hacker
Q.5. A hacker contacts your phone or E-mails and attempts to acquire your password is called
a) spoofing
b) phishing
c) spamming
d) bugging
e) None of these
b) phishing
Q.6. Unauthorised copying of software to be used for personal gain instead of personal backups is called
a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting
c) software piracy
Q.7. The first computer virus is
a) creeper
b) PARAM
c) the famous
d) HARLIE
e) None of these
a) creeper
Q.8. Blue hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
Q.9. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _ security is concerned with protecting software from unauthorised tampering or damage.
a) data
b) cyber
c) Internet
d) metaphysical
e) publicity
b) cyber
Q.10. First boot sector virus is
a) computed
b) mind
c) brian
d) Elk Cloner
e) None of these
c) brian
Q.11. Black hat is
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
c) hacker who utilizes technology to announce a political message.
d) None of these
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
Q.12. Hackers often gain entry to a network be pretending to be at a legitimate computer
a) spoofing
b) forging
c) IP spoofing
d) None of these
c) IP spoofing
Q.13. _ are attempts by individuals to obtain confidential information from you by falsifying their identity.
a) Phishing trips
b) Computer viruses
c) Special function cards
d) Scanners
e) Keyboards
a) Phishing trips
Q.14. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker
a) Trojan horses
Q.15. Some viruses have delayed payload, which is sometimes called a
a) time
b) anti-virus
c) bomb
d) All of these
e) None of these
c) bomb
Q.16. A spoofing attack is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Q.17. Grey hat is
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
d) None of these
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
Q.18. A time bomb occurs during a particular
a) data or time
b) logic and data
c) only time
d) All of the above
e) None of these
c) only time
Q.19. _ are often delivered to PC through an E-mail attachment and are often designed to do harm.
a) Viruses
b) Spam
c) Portals
d) Email messages
e) None of these
b) Spam
Q.20. What is the most common way to get a virus in your computer’s hard disk?
a) By installing games from their CDROMS
b) By uploading pictures from mobile phones to the computer
c) By opening emails
d) By sending emails
e) None of these
c) By opening emails
Computer Security GK Questions All SET MCQ-
- Computer Security GK Questions SET-1
- Computer Security GK Questions SET-2
- Computer Security GK Questions SET-3
- Computer Security GK Questions SET-4
We hope the given GK MCQ Questions for Computer Security GK PDF Free Download will definitely yield fruitful results. If you have any queries related to Computer Security GK Multiple Choice Questions with Answers, drop your questions below and will get back to you soon.