Top 50+ Solved Computer Security MCQ Questions Answer
Q. A spoofing attack is
a. a prepared application that takes advantage of a known weakness.
b. a tool used to quickly check computers on a network for known weaknesses.
c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Q. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
a. security exploit
b. vulnerability scanner
c. packet sniffer
d. rootkit