Top 50+ Solved Computer Security MCQ Questions Answer

From 1 to 15 of 17

Q. A vulnerability scanner is

a. a prepared application that takes advantage of a known weakness.

b. a tool used to quickly check computers on a network for known weaknesses.

c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

  • b. a tool used to quickly check computers on a network for known weaknesses.

Q. A packet sniffer is

a. a prepared application that takes advantage of a known weakness.

b. a tool used to quickly check computers on a network for known weaknesses.

c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

  • c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

Q. These hacker breaks security for altruistic or at least non-malicious reasons.

a. White hat

b. Grey hat

c. Blue hat

d. None of these

  • a. White hat

Q. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

a. White hat

b. Grey hat

c. Blue hat

d. None of these

  • b. Grey hat

Q. These are program designed as to seem to being or be doing one thing, but actually being or doing another.

a. Trojan horses

b. Keylogger

c. Worm

d. Cracker

  • a. Trojan horses

Q. Packet Sniffer is

a. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d. None of these

  • a. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

Q. Rootkit is

a. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d. None of these

  • b. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Q. Spoofing attack is

a. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

b. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

c. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

d. None of these

  • c. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

Q. Security exploit is

a. a prepared application that takes advantage of a known weakness.

b. a tool used to quickly check computers on a network for known weaknesses.

c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

  • a. a prepared application that takes advantage of a known weakness.
Subscribe Now

Get All Updates & News