Computer Security Important Questions and Answers
1. A vulnerability scanner is
(A) a prepared application that takes advantage of a known weakness
(B) a tool used to quickly check computers on a network for known
weaknesses.
(C) an application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(D) a situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access.
Ans -B. a tool used to quickly check computers on a network for known
weaknesses.
2. A packet sniffer is
(A)prepared application that takes advantage of a known weakness
(B)a tool used to quickly check computers on a network for known
weaknesses.
(C )an application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(D)a situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access.
Ans- C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
3. These hacker breaks security for altruistic or at least non -malicious
reasons
(A) White Hat
(B) Grey Hat
(C) Blue Hat
(D) None of these
Ans-A. White Hat
4. This hacker is a hacker of ambiguous ethics and /or borderline legality ,often frankly admitted
(A) White Hat
(B) Grey Hat
(C) Blue Hat
(D) None of these
Ans-B. Grey Hat
5. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can
be closed
(A) White Hat
(B) Grey Hat
(C) Blue Hat
(D) None of these
Ans-C. Blue Hat
6. It is a software program designed to record (‘log’) every keystroke on the
machine on which it runs
(A) Keylogger
(B) Worm
(C) Virus
(D) Cracker
Ans- A. Keylogger
7. It is a self -replicating program that infects computer and spreads by
inserting copies of itself into other executable code or documents
(A)Keylogger
(B)Worm
(C )Virus
(D)Cracker
Ans- C. Virus
8. Like a virus , it is also a self replicating program. The difference between a
virus and it is that a worm does not create copies of itself on one system :it propagates through computer networks
(A)Keylogger
(B)Worm
(C )Virus
(D)Cracker
Ans- B. Worm
9. Viruses that fool a user into downloading and /or executing them by pretending to be useful applications are also sometimes called?
(A) Trojan horses
(B) Keylogger
(C) Worm
(D) Cracker
Ans- A. Trojan horses
10. These are program designed as to seem to being or be doing one thing , but actually being or doing another
(A) Trojan horses
(B) Keylogger
(C) Worm
(D) Cracker
Ans-A. Trojan horses
11. It is a toolkit for hiding the fact that a computer’s security has been compromised , is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators
(A) Rootkit
(B) Keylogger
(C) Worm
(D) Cracker
Ans- A. Rootkit
12. Packet sniffer is
(A) An application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(B) A situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access
(C) A toolkit for hiding the fact that a computer’s security has been
compromised , is a general description of a set of programs which work to
subvert control of an operating system from its legitimate (in accordance with
established rules) operators
(D) None of these
Ans- A. An application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
13. Rootkit is
(A)An application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(B)A situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access
(C )A toolkit for hiding the fact that a computer’s security has been
compromised , is a general description of a set of programs which work to
subvert control of an operating system from its legitimate (in accordance with
established rules) operators
(D)None of these
Ans- B. A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access
14. Spoofing attack is
(A)An application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(B)A situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access
(C )A toolkit for hiding the fact that a computer’s security has been
compromised , is a general description of a set of programs which work to
subvert control of an operating system from its legitimate (in accordance with
established rules) operators
(D)None of these
Ans- C. A toolkit for hiding the fact that a computer’s security has been compromised , is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators
15. Security exploit is
(A) A prepared application that takes advantage of a known weakness
(B) A tool used to quickly check computers on a network for known
weaknesses
(C) An application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(D) A situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access.
Ans- A. A prepared application that takes advantage of a known
weakness
16. A spoofing attack is
(A)A prepared application that takes advantage of a known weakness
(B)A tool used to quickly check computers on a network for known
weaknesses
(C)An application that captures TCP/IP data packets, which can maliciously
be used to capture passwords and other data while it is in transit either within
the computer or over the network
(D)A situation in which one person or program successfully masquerades as
another by falsifying data and thereby gaining illegitimate access.
Ans- D. A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
17. White hat is
(A) hacker breaks security for altruistic or at least non- malicious reasons
(B) Hacker of ambiguous ethics and/or borderline legality ,often frankly
admitted
(C) Someone outside computer security consulting firms that are used to bug
test a system prior to its launch , looking for exploits so they can be closed
(D) None of these
Ans- A. hacker breaks security for altruistic or at least non- malicious reasons
18. Grey hat is
(A) hacker breaks security for altruistic or at least non- malicious reasons
(B)Hacker of ambiguous ethics and/or borderline legality ,often frankly
admitted
(C )Someone outside computer security consulting firms that are used to bug
test a system prior to its launch , looking for exploits so they can be closed
(D)None of these
Ans- B. Hacker of ambiguous ethics and/or borderline legality ,often frankly admitted
19. Blue hat is
(A) hacker breaks security for altruistic or at least non- malicious reasons
(B)Hacker of ambiguous ethics and/or borderline legality ,often frankly
admitted
(C )Someone outside computer security consulting firms that are used to bug
test a system prior to its launch , looking for exploits so they can be closed
(D)None of these
Ans- C. Someone outside computer security consulting firms that are used to bug test a system prior to its launch , looking for exploits so they can be closed
20. Black hat is
(A) Someone who subverts computer security without authorization or who
uses technology (usually a computer or the internet )for terrorism ,vandalism
(malicious destruction ), credit card fraud, identity theft, intellectual property
theft, or many other types of crime
(B) A person, usually not an expert in computer security ,who breaks into
computer systems by using pre -packaged automated tools written by others
(C) Hacker who utilizes technology to announce a political message
(D) None of these
Ans- A. Someone who subverts computer security without
authorization or who uses technology (usually a computer or the
internet )for terrorism ,vandalism (malicious destruction ), credit card
fraud, identity theft, intellectual property theft, or many other types of
crime
21. Script kiddie is
(A)Someone who subverts computer security without authorization or who
uses technology (usually a computer or the internet )for terrorism ,vandalism
(malicious destruction ), credit card fraud, identity theft, intellectual property
theft, or many other types of crime
(B) Person, usually not an expert in computer security ,who breaks into
computer systems by using pre -packaged automated tools written by others
(C )Hacker who utilizes technology to announce a political message
(D)None of these
Ans- B. Person, usually not an expert in computer security ,who breaks
into computer systems by using pre -packaged automated tools written
by others
22 Hacktivism is
(A)Someone who subverts computer security without authorization or who
uses technology (usually a computer or the internet )for terrorism ,vandalism
(malicious destruction ), credit card fraud, identity theft, intellectual property
theft, or many other types of crime
(B) A person, usually not an expert in computer security ,who breaks into
computer systems by using pre -packaged automated tools written by others
(C )Hacker who utilizes technology to announce a political message
(D)None of these
Ans- C. Hacker who utilizes technology to announce a political message
23.It is prepared application that takes advantage of a known weaknesses
(A) Security exploit
(B) Vulnerability scanner
(C) Packet sniffer
(D) Rootkit
Ans- A. Security exploit
24. It is tool used to quickly check computers on a network for known
weaknesses
(A)Security exploit
(B)Vulnerability scanner
(C )Packet sniffer
(D)Rootkit
Ans- B. Vulnerability scanner
25. It is an application that captures TCP/IP data packets ,which can
maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
(A)Security exploit
(B)Vulnerability scanner
(C ) Packet sniffer
(D)Rootkit
Ans-C. Packet sniffer
26. It is a situation in which one person or program successfully masquerades
as another by falsifying data and thereby gaining illegitimate access
(A)Security exploit
(B)Vulnerability scanner
(C )Packet sniffer
(D)Rootkit
Ans- A. Security exploit