Computer System Security MCQ with answers -04

Posted by

COMPUTER SYSTEM SECURITY MCQ with all answers (100% free pdf download)

Computer System Security Introduction: Introduction, What is computer security and what to
learn? , Sample Attacks, The Marketplace for vulnerabilities, Error 404 Hacking digital India
part 1 chase.
Hijacking & Defense: Control Hijacking ,More Control Hijacking attacks integer overflow
,More Control Hijacking attacks format string vulnerabilities, Defense against Control Hijacking – Platform Defenses, Defense against Control Hijacking – Run-time Defenses, Advanced
Control Hijacking attacks.

76. Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
a. Cyber low
b. Cyberethics
c. Cybersecurity
d. Cybersafety
Answer: b

77. Which of the following refers to the violation of the principle if a computer is no more accessible?
a. Access control
b. Confidentiality
c. Availability
d. All of the above
Answer: c

78. Which one of the following refers to the technique used for verifying the integrity of the message?
a. Digital signature
b. Decryption algorithm
c. Protocol
d. Message Digest
Answer: d

79. Which one of the following usually used in the process of Wi-Fi-hacking?
a. Aircrack-ng
b. Wireshark
c. Norton
d. All of the above
Answer: a

80. Which of the following port and IP address scanner famous among the users?
a. Cain and Abel
b. Angry IP Scanner
c. Snort
d. Ettercap
Answer: b

81. In ethical hacking and cyber security, there are _______ types of scanning:
a. 1
b. 2
c. 3
d. 4
Answer: c

82. Which of the following is not a type of scanning?
a. Xmas Tree Scan
b. Cloud scan
c. Null Scan
d. SYN Stealth
Answer: b

83. In system hacking, which of the following is the most crucial activity?
a. Information gathering
b. Covering tracks
c. Cracking passwords
d. None of the above
Answer: c

84. Which of the following are the types of scanning?
a. Network, vulnerability, and port scanning
b. Port, network, and services
c. Client, Server, and network
d. None of the above
Answer: a

85. Which one of the following is actually considered as the first computer virus?
a. Sasser
b. Blaster
c. Creeper
d. Both A and C
Answer: c

86. To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
a. Antivirus
b. Firewall
c. Vlc player
d. Script
Answer: b

87. Code Red is a type of ________
a. An Antivirus Program
b. A photo editing software
c. A computer virus
d. A video editing software
Answer: c

88. Which of the following can be considered as the elements of cyber security?
a. Application Security
b. Operational Security
c. Network Security
d. All of the above
Answer: d

89. Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user’s system?
a. DDos and Derive-by Downloads
b. Malware & Malvertising
c. Phishing and Password attacks
d. All of the above
Answer: d

90. Which one of the following is also referred to as malicious software?
a. Maliciousware
b. Badware
c. Ilegalware
d. Malware
Answer: d

91. Hackers usually used the computer virus for ______ purpose.
a. To log, monitor each and every user’s stroke
b. To gain access the sensitive information like user’s Id and Passwords
c. To corrupt the user’s data stored in the computer system
d. All of the above
Answer: d

92. In Wi-Fi Security, which of the following protocol is more used?
a. WPA
b. WPA2
c. WPS
d. Both A and C
Answer: b

93. The term “TCP/IP” stands for_____
a. Transmission Contribution protocol/internet protocol
b. Transmission Control Protocol/internet protocol
c. Transaction Control protocol/internet protocol
d. Transmission Control Protocol/internet protocol
Answer: b

94. The response time and transit time is used to measure the ____________ of a network.
a. Security
b. Longevity
c. Reliability
d. Performance
Answer: d

95. Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?
a. Reliability
b. Performance
c. Security
d. Longevity
Answer: d

96. In the computer networks, the encryption techniques are primarily used for improving the ________
a. Security
b. Performance
c. Reliability
d. Longevity
Answer: a

97. Which of the following statements is correct about the firewall?
a. It is a device installed at the boundary of a company to prevent unauthorized physical access.
b. It is a device installed at the boundary of an incorporate to protect it against the unauthorized access.
c. It is a kind of wall built to prevent files form damaging the corporate.
d. None of the above.

98. When was the first computer virus created?
a. 1970
b. 1971
c. 1972
d. 1969
Answer: b

99. Which of the following is considered as the world’s first antivirus program?
a. Creeper
b. Reaper
c. Tinkered
d. Ray Tomlinson
Answer: b

100. Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?
a. Open-Design
b. Economy of the Mechanism
c. Least privilege
d. Fail-safe Defaults
Answer: b