This section contains more frequently asked Computer Security MCQs in the various competitive exams.
1. Which of the following techniques helps in cases of address forgery?
- SMTP extensions
- Cryptographic authentication
- Path authentication
- Hybrid authentication
2. Which of the following types of virus lives in the boot sector?
- Sector virus
- Parasitic virus
- boot sector virus
- Bootable virus
3. Which of the following is the Symmetric Algorithm used in cryptography?
- MD4
- El Gamal
- IDEA
- RSA
4. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
- Phishing and Fraud
- Spoofing mails
- Hoaxes
- Chain mails
5. What is botnet?
- A software that runs automatically and autonomously.
- A software used for antispam
- A software used to manage MTA
- A software used to manage MDA
6. Which of the following goals cannot be achieved with the help of Symmetric Cryptography?
- Nonrepudiation
- Confidentiality
- Integrity
- Availability.
7. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
- Mail User Agent
- Firewall
- Router
- Mail Transfer Agent
8. What is the maximum key length of AES?
- 56
- 156
- Variable
- 256
9. Which of the following are disadvantages of the Symmetric Key Cryptography?
- Nonrepudiation
- Scalability
- Key distribution
- Security.
10. What are the Measures to be Adopt for Best Virus Protection?
- Use of Antivirus.
- Use of Firewall.
- Keeping Software updated.
- Download only trusted programs.
- Avoid pirated software.
- Be cautious about Phishing and Social Engineering.
- Be wise with Passwords.
- All Of the Above