Computer System Security MCQ with answers -03

Posted by

COMPUTER SYSTEM SECURITY MCQ with all answers (100% free pdf download)

Computer System Security Introduction: Introduction, What is computer security and what to
learn? , Sample Attacks, The Marketplace for vulnerabilities, Error 404 Hacking digital India
part 1 chase.
Hijacking & Defense: Control Hijacking ,More Control Hijacking attacks integer overflow
,More Control Hijacking attacks format string vulnerabilities, Defense against Control Hijacking – Platform Defenses, Defense against Control Hijacking – Run-time Defenses, Advanced
Control Hijacking attacks.

52. A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a _____________
a. GoS attack
b. PDoS attack
c. DoS attack
d. DDoS attack
Answer: (d)

53. _____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.
a. Cryptography
b. Tomography
c. Steganography
d. Chorography
Answer: (c)

54. In Steganography People will normally think it as a normal/regular file and your secret message will pass on without any _______________
a. Suspicion
b. decryption
c. encryption
d. cracking
Answer: (a)

55. ______________ Attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means.
a. online
b. offline
c. password
d. non-electronic
Answer: (b)

56. Which among the following is the least strong security encryption standard?
a. WEP
b. WPA
c. WPA2
d. WPA2
Answer: (a)

57. _____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
a. Scareware
b. Ransomware
c. Adware
d. Spyware
Answer: (b)

58. ______________ are special malware programs written to spy your mobile phones and systems.
a. Scareware
b. Ransomware
c. Adware
d. Spyware
Answer: (d)

59. An attacker may use automatic brute forcing tool to compromise your ____________
a. username
b. employee ID
c. system / PC name
d. password
Answer: (d)

60. ____________ is a code injecting method used for attacking the database of a system / website
a. HTML injection
b. SQL Injection
c. Malicious code injection
d. XML Injection
Answer: (b)

61. When there is an excessive amount of data flow, which the system cannot handle, _____ takes place.
a. Database crash attack
b. DoS (Denial of Service) attack
c. Data overflow Attack
d. Buffer Overflow attack
Answer: (d)

62. Which of this is an example of physical hacking?
a. Remote Unauthorised access
b. Inserting malware loaded USB to a system
c. SQL Injection on SQL vulnerable site
d. DDoS (Distributed Denial of Service) attack
Answer: (b)

63. Which method of hacking will record all your keystrokes?
a. Keyhijacking
b. Keyjacking
c. Keylogging
d. Keyboard monitoring
Answer: (c)

64. _____is Self-replicating in nature.
a. Trojan
b. Virus
c. Worm
d. mail Bomb
Answer: (b)

65. _______ is a harmful code embedded inside a seemingly harmless program
a. Trojan Horse
b. Virus
c. Worm
d. Email Bomb
Answer: (a)

66. Programmers add ______________for maintenance hooks and troubleshooting
a. Spyware
b. Virus
c. Malware
d. Backdoors
Answer: (d)

67. In which of the following, a person is constantly followed/chased by another person or group of several peoples?
a. Phishing
b. Bulling
c. Stalking
d. Identity theft
Answer: c

68. Which one of the following can be considered as the class of computer threats?
a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C
Answer: a

69. Which of the following is considered as the unsolicited commercial email?
a. Virus
b. Malware
c. Spam
d. All of the above
Answer: c

70. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above
Answer: b

71. _______ is a type of software designed to help the user’s computer detect viruses and avoid them.
a. Malware
b. Adware
c. Antivirus
d. Both B and C
Answer: c

72. Which one of the following is a type of antivirus program?
a. Quick heal
b. Mcafee
c. Kaspersky
d. All of the above
Answer: d

73. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
a. Antivirus
b. Firewall
c. Cookies
d. Malware
Answer: b

74. Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?
a. Piracy
b. Plagiarism
c. Intellectual property rights
d. All of the above
Answer: d

75. Read the following statement carefully and find out whether it is correct about the hacking or not? It can be possible that in some cases, hacking a computer or network can be legal.
a. No, in any situation, hacking cannot be legal
b. It may be possible that in some cases, it can be referred to as a legal task
Answer: b