Aptitude Reasoning English GK Computer Knowledge Programming Skill Banking Software Testing



Question - 1

Which of the following is a class of computer threat

  • DoS attacks
  • Phishing
  • Stalking
  • Soliciting
Solutions
Question - 2

Firewalls are to protect against

  • Virus Attacks
  • Fire Attacks
  • Unauthorized Attacks
  • Data Driven Attacks
Solutions
Question - 3

The first computer virus is

  • Morris Worm
  • Creeper
  • ILOVEYOU
  • Stuxnet
Solutions
Question - 4

Which of the following is considered as the unsolicited commercial email?

  • Virus
  • Malware
  • Spam
  • All of the above
Solutions
Question - 5

Firewall is a type of ____________

  • Virus
  • Security threat
  • Worm
  • None of the above
Solutions
Question - 6

Which one of the following is a key function of firewall?

  • Copying
  • Moving
  • Deleting
  • Monitoring
Solutions
Question - 7

Below whic one is monitors user activity on internet and transmit that information in the background to someone?

  • Malware
  • Spyware
  • Adware
  • None of the above
Solutions
Question - 8

Like a virus , it is a self-replicating program it also propagates through computer network

  • Phishing scam
  • Worm
  • Spyware
  • Cracker
Solutions
Question - 9

Which of the following is not an external threat to a computer or a computer network

  • Ignorance
  • Trojan horses
  • Adware
  • Crackers
Solutions
Question - 10

What is Trojan-Horse 

  • Are hacker programs that do not show up on the system
  • Are legitimate programs that allow unauthorized access
  • Really do not usually work
  • Usually are immediately discovered
Solutions
Question - 11

Which one of the following is a type of antivirus program?

  • Quick heal
  • Mcafee
  • Kaspersky
  • All the above
Solutions
Question - 12

Which of the following tool is used for Wi-Fi hacking?

  • Nessus
  • Snort
  • Wireshark
  • Aircrack-ng
Solutions
Question - 13

What was the name of program Robert Thomas created?

  • Virus
  • Wireshark
  • Nessus
  • Creeper
Solutions
Question - 14

What was the name of first antivirus software?

  • reaper
  • Creeper
  • tinkered
  • repair
Solutions
Question - 15

Which of the following is not an information source over the internet for target attackers?

  • YouTube
  • Whois
  • Nslookup
  • Archive sites
Solutions
Question - 16

ISPs stands for?

  • Intranet service providers
  • Internet service providers
  • interneted service providers
  • Information service providers
Solutions
Question - 17

 cyberattack is any offensive maneuver that targets?

  • computer information systems
  • infrastructures
  • computer networks
  • All the above
Solutions
Question - 18

which factor is a measure of the actual damage achieved by an attack?

  • Cyberwarfare
  • Spectacularity
  • Vulnerability
  • All of the above
Solutions
Question - 19

Which is not a valid scanning method?

  • Null Scan
  • Cloud scan
  • SYN Stealth scan
  • Xmas Tree scan
Solutions
Question - 20

We should turn on ______ to protect Our Computer from hacker.

  • VLC
  • Script
  • Antivirus
  • Firewall
Solutions
Tags:
Computer Security MCQs,Quiz on Computer Security,Computer Security test,Computer Security MCQs and Answers,Multiple choice questions on Computer Security PDF,Computer Security test,Computer Security quiz