Cyber Security MCQ SET- 26
This section contains more frequently asked Computer Security MCQs in the various competitive exams.
1. What are types of malware?
- Viruses
- Spyware
- Worms
- All of these
✅ Correct Answer: D. All of these
2. What could be a good indicator of a Spam email?
- Something that sounds too good to be true
- An email that contains plenty of grammar mistakes
- An email sent to a bunch of random people
- All of these
✅ Correct Answer: D. All of these
3. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
- the attachment is saved to the disk
- the attachment is decompressed
- the attachment opens in a preview editor
- the attachment executes
✅ Correct Answer: D. the attachment executes
4. If you cannot delete malware infected file, what is good method to try first?
- Reformat then attempt to delete the file
- Run Windows Repair
- Run Windows Restore
- Boot in Windows safe mode and attempt to delete the file
✅ Correct Answer: D. Boot in Windows safe mode and attempt to delete the file
5. Which of these is an example of a possible victim in a phishing attack?
- The website that was hacked
- The person who had their identity stolen
- The bank of the victim
- All of these
✅ Correct Answer: D. All of these
6. What is a keylogger?
- Software that that records keys you set when encrypting files
- Software that records keystrokes made on a keyboard
- Software used to log all attempts to access a certain file
- Software that steals passwords or "keys" that you have saved on your computer
✅ Correct Answer: B. Software that records keystrokes made on a keyboard
7. A virus can spread to another computer by
- Sharing an infected file with another computer
- Through touch
- Pinging other computers from the infected computer
- Being on the same network as that computer
✅ Correct Answer: A. Sharing an infected file with another computer
8. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
- collect email addresses
- deny service to mail list recipients
- introduce security holes into the list
- None of these
✅ Correct Answer: A. collect email addresses
9. What is a computer virus?
- Software that steals files from your computer and is used by blackmailers
- Spyware that slows down a computer by sending statistics to an unknown source
- A type of malware that replicates itself and spreads to other files and/or computers.
- A software that hijacks your computer and asks you to pay in order for it to be removed
✅ Correct Answer: C. A type of malware that replicates itself and spreads to other files and/or computers.
10. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
- Use IFRAME's
- Allow XSS
- Scan for and fix XSS issues
- Use Pop-ups
✅ Correct Answer: C. Scan for and fix XSS issues
← Previous