General Knowledge

Computer Security Multiple Choice Questions and Answers

cyber security quiz

Computer Security Questions and Answers:

Ques. A Proxy server is used for which of the following?
(a) To provide security against unauthorized users
(b) To process client requests for web pages
(c)  To process client requests for database access
(d) To provide TCP/IP
Ans. (b)

Ques. Passwords enable users to
(a) get into the system quickly
(b) make efficient use of time
(c) retain confidentiality of files
(d) simplify file structures
Ans. (c)

Related: Major stock markets in the world

Ques. Technology no longer protected by copyright, available to everyone, is considered to be:
(a) proprietary
(b) open
(c) experimental
(d) in the public domain.
Ans. (a)

Ques. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running in the event of a system crash or failure
(d) All of these
Ans. (d)

Ques. A computer checks the _____ of user names and passwords for a match before granting access.
(a) Website
(b) Network
(c) Backup file
(d) Data base
Ans. (d)

Ques. All of the following are examples of real security and privacy risks EXCEPT:
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
Ans. (b)

Related: List of Asian Countries and their Capitals

Ques. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) THe Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
Ans. (b)

Ques. All of the following are examples of real security and privacy risks EXCEPT:
(a) hackers
(b) spam
(c) viruses
(d) identity theft
Ans. (b)

Ques. All of the following are examples of real security and privacy risks except?
(a) hackers
(b) spam
(c) viruses
(d) identify theft
Ans. (d)

Ques. __ is a computer crime in which criminal breaks into a computer system for exploring details of information etc.
(a) Hacking
(b) Spoofing
(c) Eavesdropping
(d) Phishing
Ans. (a)

Related: who is the largest Bank in the US

Ques. Which of the following would most likely NOT be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
Ans : (b)

Ques. ____ are viruses that are triggered by the passage of time or on a certain date.
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
Ans. (c)

Ques. Verification of a login name and password is known as:
(a) configuration
(b) accessibility
(c) authentication
(d) logging in
Ans. (a)

Ques. __ is a security protocol based on digital certificates.
(a) Digital signature
(b) Secure sockets layer protocol
(c) Secure electronic transactions
(d) None of these
Ans. (c)

Related: Currency of Europe countries

Ques. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(a) robotics
(b) simulation
(c) computer forensics
(d) animation
Ans. (c)

Ques. Firewalls are used to protect against __
(a) unauthorized Attacks
(b) virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
Ans. (a)

Ques. Which of the following would most likely NOT be a symptom of a virus?
(a) Existing program files and icons disappear.
(b) The CD-ROM stops functioning.
(c) The Web browser opens to an unusual home page.
(d) Odd messages or images are displayed on the screen.
Ans. (b)

Ques. __ is an electronic file that uniquely identifies individuals and web sites on the internet and enables secure confidential communications.
(a) Digital signature
(b) Digital certificates
(c) Secure electronic transactions
(d) None of these
Ans. (b)

Related: Axis bank logo

Ques. Now a days Phishing has become a criminal practice of using social engineering over which of the following ?
(a) Social networking sites
(b) Mobile Phones
(c) E-mail
(d) Cyber cafes
Ans. (b)

Ques. Technology no longer protected by copyright, available to everyone, is considered to be:
(a) proprietary
(b) open
(c) experimental
(d) in the public domain
Ans. (a)

Ques. What is backup?
(a) Adding more components to your network
(b) Protecting data by copying it from the original source to a different destination
(c) Filtering old data from the new data
(d) Accessing data on tape
Ans. (b)

Ques. __ can be used to minimize the risk of security breaches or viruses.
(a) Firewall
(b) Backups
(c) Encryption
(d) Digital signature
Ans. (a)

Related: the Cube questions

Ques. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(a) spyware
(b) adware
(c) spam
(d) malware
Ans. (d)

Ques. A __ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) None of these
Ans. (d)

Ques. A result of a computer virus can not lead to __
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption o f program
(d) Deletion of files
Ans. (b)

Ques. The private content of a transaction, if unprotected can be intercepted when it goes through the route over the internet is called __
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing
Ans. (c)

Related: list of countries in Oceania

Ques. _____ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(a) Nanoscience
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence
Ans. (d)

Ques. If you receive an e-mail from someone you don’t know, what should you do ?
(a) Forward it to the police immediately
(b) Delete it without opening it
(c) Open it and respond to them saying you don’t know them
(d)  Reply and ask them for their personal information
Ans. (b)

Ques. All of the following are examples of real security and privacy risks Except ___
(a) hackers
(b) spam
(c) viruses
(d) identify theft
Ans. (b)

Ques. __ Is a specialized form of online identity theft.
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing
Ans. (d)

Related: Petroleum Quiz Online

Ques. __ involves some one masquerading as someone else.
(a) Spoofing
(b) Unauthorized action
(c) Eavesdropping
(d) Phishing
Ans. (a)

Ques. When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as __
(a) Spoofing
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing
Ans. (b)

Ques. A competitor or an unhappy customer can alter a website so that it refuses services to potential clients. This is known as __
(a) Unauthorized action
(b) Unauthorized disclosure
(c) Eavesdropping
(d) Phishing
Ans. (a)

Ques. __ is online identity theft.
(a) Eavesdropping
(b) Phishing
(c) Spoofing
(d) None of these
Ans. (b)

Related: Equation of a straight line maths questions

Ques. Which of the following is not a risk in internet based transaction
(a) eavesdropping
(b) spoofing
(c) encryption
(d) unauthorized action
Ans. (c)

Ques. A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is
(a) encryption
(b) firewalls
(c) digital certificates
(d) digital signature
Ans. (d)

Ques. An electronic file that uniquely identifies individuals and websites on the internet and enables secure, confidential communications.
(a) Digital signature
(b) Digital certificates
(c) Encryption
(d) Firewalls
Ans. (b)

Question:
All of the following are examples of real security and privacy risks EXCEPT:
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
Ans. (b)

About the author

Vishal Arora

Leave a Comment