Computer Security Multiple Choice Questions and Answers(Set-4)

Welcome to Computer Security GK Questions Section. This section is a category-wise archive of Computer Security GK Questions – 2021-22 in MCQs format on various subjects and states. This section is suitable for aspirants preparing for SSC-CGL and State Level Examinations of various states and also UPSC conducted NDA/ CDS/ IFS/ IES / CSE etc. examinations.


Q.1. __ is a computer crime in which criminal breaks into a computer system for exploring details of information etc.
(a) Hacking
(b) Spoofing
(c) Eavesdropping
(d) Phishing

(a) Hacking


Q.2. Which of the following would most likely NOT be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen

(b) The CD-ROM stops functioning


Q.3. __ are viruses that are triggered by the passage of time or on a certain date.
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms

(c) Time bombs


Q.4. Verification of a login name and password is known as:
(a) configuration
(b) accessibility
(c) authentication
(d) logging in

(a) configuration


Q.5. __ is a security protocol based on digital certificates.
(a) Digital signature
(b) Secure sockets layer protocol
(c) Secure electronic transactions
(d) None of these

(c) Secure electronic transactions


Q.6. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(a) robotics
(b) simulation
(c) computer forensics
(d) animation

(c) computer forensics


Q.7. Firewalls are used to protect against __
(a) unauthorized Attacks
(b) virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks

(a) unauthorized Attacks


Q.8. Which of the following would most likely NOT be a symptom of a virus?
(a) Existing program files and icons disappear.
(b) The CD-ROM stops functioning.
(c) The Web browser opens to an unusual home page.
(d) Odd messages or images are displayed on the screen.

(b) The CD-ROM stops functioning.


Q.9. __ is an electronic file that uniquely identifies individuals and web sites on the internet and enables secure confidential communications.
(a) Digital signature
(b) Digital certificates
(c) Secure electronic transactions
(d) None of these

(b) Digital certificates


Q.10. Now a days Phishing has become a criminal practice of using social engineering over which of the following ?
(a) Social networking sites
(b) Mobile Phones
(c) E-mail
(d) Cyber cafes

(b) Mobile Phones


Q.11. Technology no longer protected by copyright, available to everyone, is considered to be:
(a) proprietary
(b) open
(c) experimental
(d) in the public domain

(a) proprietary


Q.12. What is backup?
(a) Adding more components to your network
(b) Protecting data by copying it from the original source to a different destination
(c) Filtering old data from the new data
(d) Accessing data on tape

(b) Protecting data by copying it from the original source to a different destination


Q.13. __ can be used to minimize the risk of security breaches or viruses.
(a) Firewall
(b) Backups
(c) Encryption
(d) Digital signature

(a) Firewall


Q.14. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(a) spyware
(b) adware
(c) spam
(d) malware

(d) malware


Q.15. A __ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) None of these

(d) None of these


Q.16. A result of a computer virus can not lead to __
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption o f program
(d) Deletion of files

(b) Mother Board Crash


Q.17. The private content of a transaction, if unprotected can be intercepted when it goes through the route over the internet is called __
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing

(c) Eavesdropping


Q.18. _ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(a) Nanoscience
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence

(d) Artificial intelligence


Q.19. If you receive an e-mail from someone you don’t know, what should you do ?
(a) Forward it to the police immediately
(b) Delete it without opening it
(c) Open it and respond to them saying you don’t know them
(d) Reply and ask them for their personal information

(b) Delete it without opening it


Q.20.To protect system, there is how many levels of security level?

(A) One

(B) Two

(C) Three

(D) Four

(C) Three


Computer Security GK Questions All SET MCQ-


We hope the given GK MCQ Questions for Computer Security GK PDF Free Download will definitely yield fruitful results. If you have any queries related to Computer Security GK Multiple Choice Questions with Answers, drop your questions below and will get back to you soon.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top