Computer Security Aspects MCQ

find latest, unique and most imp computer security aspects mcq for all competitive and entrance exams, cuet, CS, IP and IT students. it covers viruses, worms, trojan, antivirus, firewall and many more..

  1. Malware stands for

    a. Malfunctioned Software
    b. Malcontent Software
    c. Malaysian Software
    d. Malicious Software

Show Answer

d. Malicious Software

  1. Which of the following is not a malware?

    a. Viruses
    b. Worms
    c. Trojan
    d. Cookies

Show Answer

d. Cookies

  1. (i) virus is a piece of software code that is created to hamper system resources and activated as soon as infected file is opened by user
    (ii) Virus behaves uniformly without caring of reason or motivation behind their creation

    a. (i) True, (ii) False
    b. (i) False, (ii) True
    c. Both are true
    d. Both are False

Show Answer

a. (i) True, (ii) False

  1. I
    Am a malware
    Am standalone program and capable of working on my own.
    Nimda, Code Red are some of my examples

    Who am I?

    a. Firewall
    b. Worms
    c. Trojan
    d. Spyware

Show Answer

b. Worms

  1. __________ looks like a legitimate software which once installed acts like a virus.

    a. Worm
    b. Trojan
    c. Spyware
    d. Cookies

Show Answer

b. Trojan

  1. Which of the following is usually annoying but harmless for system?

    a. Spyware
    b. Adware
    c. Trojan
    d. Worms

Show Answer

b. Adware

  1. The virtual keyboard of an operating system that uses a fixed QWERTY key layout is called

    a. On-Screen Keyboard
    b. Online Virtual Keyboard
    c. Virtual Qwerty Keyboard
    d. Virtual Keypad

Show Answer

a. On-Screen Keyboard

  1. The virtual keyboard that randomizes the key layout every time it is used

    a. On-Screen Keyboard
    b. Online Virtual Keyboard
    c. Virtual Qwerty Keyboard
    d. Virtual Keypad

Show Answer

b. Online Virtual Keyboard

  1. A malware once designed, can take many routes to reach your computer. Which of the followings you think is not correct channel of distribution of malware:

    a. Downloaded from the Internet into hard drive of computer by user unintentionally
    b. Removable storage media infected with malware get transferred to other systems that they are plugged into
    c. Links or attached files with unsolicited email we receive can be malware
    d. All are correct

Show Answer

d. All are correct

  1. Raju has been asked to identify common sign of some malware infection. Help him out to find so from given option:

    a. Program opening and closing automatically.
    b. Sudden lack of storage space, random sound starts to appear.
    c. Computer get slow down with frequent crashes
    d. All of the above
    e. (b) and (c)

Show Answer

d. All of the above

  1. Act of repeatedly sending advertisement links and invitation emails to a large number of users is called:

    a. Stacking
    b. Hacking
    c. Spamming
    d. Denial of Service

Show Answer

c. Spamming

  1. HTTPS is

    a. Hypertext transfer protocol safe
    b. Hypertext transfer protocol secure
    c. Hypertext transfer protocol sensitive
    d. Hypertext transfer protocol shared

Show Answer

b. Hypertext transfer protocol secure

  1. To get HTTPS for your website you need to get

    a. Purchase domain from Google only
    b. Purchase domain with SSL
    c. Purchase domain with Firewall
    d. Purchase domain only

Show Answer

b. Purchase domain with SSL

  1. It acts as a network filter and continuously monitors and controls the incoming and outgoing traffic.

    a. Antivirus
    b. Firewall
    c. SSL
    d. Sandbox

Show Answer

b. Firewall

  1. Cookies that gets recreated after being deleted is known as

    a. Super cookies
    b. Worm cookies
    c. Nimda cookies
    d. Zombie cookies

Show Answer

d. Zombie cookies

  1. _______ is a malware that records the key pressed by user on the keyboard. Using which one can get very sensitive and personal information of user like password emails etc.

    a. Spyware
    b. Snooping
    c. Key logger
    d. Denial of Service

Show Answer

c. Key logger

  1. Find the invalid method used by Antivirus to detect malware

    a. Sandbox detection
    b. Data mining technique
    c. Firewall
    d. Heuristics

Show Answer

c. Firewall

  1. It’s a kind of system used by antivirus where a new application or file is executed in a virtual machine (environment) to detect any malicious activity by observing its behavior

    a. Data mining
    b. Sandbox
    c. Heuristics
    d. VDF (Virus Definition File)

Show Answer

b. Sandbox

  1. Consecutive sequence of bytes that is commonly found in a certain malware sample is referred as

    a. Virus polymorphic
    b. Sandbox
    c. Virus Signature
    d. None of these

Show Answer

c. Virus Signature

  1. Method of comparing source code of a suspected program with already known virus present in database of antivirus is known as

    a. Sandbox detection
    b. Real time protection
    c. Heuristics
    d. Firewall

Show Answer

c. Heuristics

2 thoughts on “Computer Security Aspects MCQ”

Leave a Comment

Your email address will not be published. Required fields are marked *

error: Content is protected !!