Computer Security Multiple Choice Questions and Answers (Set-2)

Welcome to Computer Security GK Questions Section. This section is a category-wise archive of Computer Security GK Questions – 2021-22 in MCQs format on various subjects and states. This section is suitable for aspirants preparing for SSC-CGL and State Level Examinations of various states and also UPSC conducted NDA/ CDS/ IFS/ IES / CSE etc. examinations.

Q.1. Hackers
a) all have the same motive
b) is another name for users
c) may legally break into computers as long as they do not do any damage
d) are people who are allergic to computers
e) break into other people’s computersv

e) break into other people’s computers

Q.2. Passwords enable users to–
a) get into the system quickly
b) make efficient use of time
c) retain confidentiality of files
d) simplify file structures
e) None of these

c) retain confidentiality of files


Q.3. Spoofing attack is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.


Q.4. It is a prepared application that takes advantage of a known weakness.
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit

a) security exploit


Q.5. __ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
e) None of these

a) StealthQ9. Rootkit is


Q.6. Spoofing attack is
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.


Q.7. Which one of the following is a cryptographic protocol used to secure http connection ?
a) Stream Control Transmission Protocol (SCTP)
b) Transport Layer Security (TLS)
c) Explicit Congestion Notification (FCN)
d) Resource Reservation Protocol (RRP)
e) None of the above

b) Transport Layer Security (TLS)


Q.8. ‘Trend Micro’ is a
a) virus program
b) anti-virus software
c) just a program
d) All of these
e) None of the above

b) anti-virus software


Q.9.First boot sector virus is

(A) Computed

(B) Mind

(C) Brain

(D) Elk cloner

C)Brain


Q.10.The linking of computers with a communication system is called

(A) Assembling

(B) Interlocking

(C) Pairing

(D) Networking

D)Networking


Q.11.The phrase __ describe viruses, worms, Trojan horse attack applets and attack scripts.

(A) Spam

(B) Phishing

(C) Malware

(D) Virus

C)Malware


Q.12.Abuse messaging systems to send unsolicited is

(A) Phishing

(B) Adware

(C) Firewall

(D) Spam

D)Spam


Q.13.A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

(A) Hacker

(B) Analyst

(C) Spammer

(D) Programmer

A)Hacker


Q.14.Firewalls are to protect against

(A) Virus Attacks

(B) Fire Attacks

(C) Data Driven Attacks

(D) Unauthorized Attacks

D)Unauthorized Attacks


Q.15.The first computer virus is

(A) The famous

(B) HARLIE

(C) PARAM

(D) Creeper

D)Creeper


Q.16.A hard copy would be prepared on a

(A) Printer

(B) Joystick

(C) Trackball

(D) All of these

A)Printer


Q.17.The first PC virus was developed in

(A) 1980

(B) 1986

(C) 1988

(D) 1999

(D) 1999


Q.18.Joystick allows the movements with

(A) 90 degree angle

(B) 180 degree angle

(C) 360 degree angle

(D) 45 degree angle

C)360 degree angle


Q.19. The _ is a code embedded in a legitimate program configured to “explode” when certain conditions are met.
A Trap door

B Trojan Horse

C Logic bomb

D Virus

C)A logic bomb is a piece of code inserted into an operating system or software application that implements a malicious function after a certain time, or if specific conditions are met.


Q.20. Which of the following malware does not replicate automatically?
A Trojan Horse

B Virus

C Worm

D Zombie

A)Trojan horse is a malicious computer program that presents itself as legitimate software. Also called Trojan horse, it hides malware in a file on a normal appearance.


Computer Security GK Questions All SET MCQ-


We hope the given GK MCQ Questions for Computer Security GK PDF Free Download will definitely yield fruitful results. If you have any queries related to Computer Security GK Multiple Choice Questions with Answers, drop your questions below and will get back to you soon.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top