Computer Security Multiple Choice Questions and Answers (Set-3)

Welcome to Computer Security GK Questions Section. This section is a category-wise archive of Computer Security GK Questions – 2021-22 in MCQs format on various subjects and states. This section is suitable for aspirants preparing for SSC-CGL and State Level Examinations of various states and also UPSC conducted NDA/ CDS/ IFS/ IES / CSE etc. examinations.


Q.1.All of the following are examples of real security and privacy risks EXCEPT:
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft

(b) Spam


Q.2. A Proxy server is used for which of the following?
(a) To provide security against unauthorized users
(b) To process client requests for web pages
(c) To process client requests for database access
(d) To provide TCP/IP

(b) To process client requests for web pages


Q.3. An electronic file that uniquely identifies individuals and websites on the internet and enables secure, confidential communications.
(a) Digital signature
(b) Digital certificates
(c) Encryption
(d) Firewalls

(b) Digital certificates


Q.4. Passwords enable users to
(a) get into the system quickly
(b) make efficient use of time
(c) retain confidentiality of files
(d) simplify file structures

(c) retain confidentiality of files


Q.5. A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is
(a) encryption
(b) firewalls
(c) digital certificates
(d) digital signature

(d) digital signature


Q.6. Which will not harm computer resources
(a) firewall
(b) Virus
(c) Trojan horse
(d) None of the above

(a) firewall


Q.7. Which of the following is not a risk in internet based transaction
(a) eavesdropping
(b) spoofing
(c) encryption
(d) unauthorized action

(c) encryption


Q.8. Technology no longer protected by copyright, available to everyone, is considered to be:
(a) proprietary
(b) open
(c) experimental
(d) in the public domain.

(a) proprietary


Q.9. __ is online identity theft.
(a) Eavesdropping
(b) Phishing
(c) Spoofing
(d) None of these

(b) Phishing


Q.10. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running in the event of a system crash or failure
(d) All of these

(d) All of these


Q.11. A competitor or an unhappy customer can alter a website so that it refuses services to potential clients. This is known as __
(a) Unauthorized action
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing

(a) Unauthorized action


Q.12. A computer checks the _ of user names and passwords for a match before granting access.
(a) Website
(b) Network
(c) Backup file
(d) Data base

(d) Data base


Q.13. When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as __
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing

(b) Unauthorized disclosure


Q.14. All of the following are examples of real security and privacy risks EXCEPT:
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft

(b) Spam


Q.15. __ involves some one masquerading as someone else.
(a) Spoofing
(b) Unauthorized action
(c) Eavesdropping
(d) Phishing

(a) Spoofing


Q.16. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) THe Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen

(b) The CD-ROM stops functioning


Q.17. __ Is a specialized form of online identity theft.
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing

(d) Phishing


Q.18. All of the following are examples of real security and privacy risks EXCEPT:
(a) hackers
(b) spam
(c) viruses
(d) identity theft

(b) spam


Q.19. All of the following are examples of real security and privacy risks Except _
(a) hackers
(b) spam
(c) viruses
(d) identify theft

(b) spam


Q.20. All of the following are examples of real security and privacy risks except?
(a) hackers
(b) spam
(c) viruses
(d) identify theft

(d) identify theft


Computer Security GK Questions All SET MCQ-


We hope the given GK MCQ Questions for Computer Security GK PDF Free Download will definitely yield fruitful results. If you have any queries related to Computer Security GK Multiple Choice Questions with Answers, drop your questions below and will get back to you soon.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top