Top 50+ Solved Computer Security MCQ Questions Answer

From 16 to 17 of 17

Q. A spoofing attack is

a. a prepared application that takes advantage of a known weakness.

b. a tool used to quickly check computers on a network for known weaknesses.

c. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

  • d. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Q. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

a. security exploit

b. vulnerability scanner

c. packet sniffer

d. rootkit

  • a. security exploit
Subscribe Now

Get All Updates & News