This section contains more frequently asked Computer Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What are types of malware?

  • Viruses
  • Spyware
  • Worms
  • All of these

2. What could be a good indicator of a Spam email?

  • Something that sounds too good to be true
  • An email that contains plenty of grammar mistakes
  • An email sent to a bunch of random people
  • All of these

3. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?

  • the attachment is saved to the disk
  • the attachment is decompressed
  • the attachment opens in a preview editor
  • the attachment executes

4. If you cannot delete malware infected file, what is good method to try first?

  • Reformat then attempt to delete the file
  • Run Windows Repair
  • Run Windows Restore
  • Boot in Windows safe mode and attempt to delete the file

5. Which of these is an example of a possible victim in a phishing attack?

  • The website that was hacked
  • The person who had their identity stolen
  • The bank of the victim
  • All of these

6. What is a keylogger?

  • Software that that records keys you set when encrypting files
  • Software that records keystrokes made on a keyboard
  • Software used to log all attempts to access a certain file
  • Software that steals passwords or "keys" that you have saved on your computer

7. A virus can spread to another computer by

  • Sharing an infected file with another computer
  • Through touch
  • Pinging other computers from the infected computer
  • Being on the same network as that computer

8. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?

  • collect email addresses
  • deny service to mail list recipients
  • introduce security holes into the list
  • None of these

9. What is a computer virus?

  • Software that steals files from your computer and is used by blackmailers
  • Spyware that slows down a computer by sending statistics to an unknown source
  • A type of malware that replicates itself and spreads to other files and/or computers.
  • A software that hijacks your computer and asks you to pay in order for it to be removed

10. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?

  • Use IFRAME's
  • Allow XSS
  • Scan for and fix XSS issues
  • Use Pop-ups
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook