Computer Security Test Online MCQs With Answers
Home / Tests / Computer Security Test Online MCQs

Computer Security Test Online MCQs

Test Name Computer Security Test
Subject Computer
Test Type MCQs
Total Question 20
Total Marks 40
Total Time 20 Mints
Test Help For
  • Basic Knowledge about IT
  • IT General Knowledge Quiz
  • Computer History
  • IT & Computer Tests
  • General Ability
  • Competitive Exams.

Computer Security Test Online MCQs

Computer

1. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

Question 1 of 20

2. Grey hat is:

Question 2 of 20

3. These hacker breaks security for altruistic or at least non-malicious reasons.

Question 3 of 20

4. A packet sniffer is:

Question 4 of 20

5. Packet Sniffer is:

Question 5 of 20

6. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.

Question 6 of 20

7. These are program designed as to seem to being or be doing one thing, but actually being or doing another.

Question 7 of 20

8. Rootkit is:

Question 8 of 20

9. White hat is:

Question 9 of 20

10. Blue hat is:

Question 10 of 20

11. Script kiddie is:

Question 11 of 20

12. Black hat is:

Question 12 of 20

13. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

Question 13 of 20

14. It is a software program designed to record (‘log’) every keystroke on the machine on which it runs

Question 14 of 20

15. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?

Question 15 of 20

16. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

Question 16 of 20

17. A vulnerability scanner is:

Question 17 of 20

18. Security exploit is:

Question 18 of 20

19. Spoofing attack is:

Question 19 of 20

20. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.

Question 20 of 20


 

Test By Subject
Test By Topics
Have any Problem or Error please mention in below comments section.

Leave a Reply

Your email address will not be published. Required fields are marked *