This section contains more frequently asked Computer Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What run command can you use to check what programs load on startup?

  • cmd
  • ipconfig
  • msconfig
  • startup

2. A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?

  • Reinstall Windows
  • Reformat the computer
  • Boot from a USB drive and run a program to remove the malware
  • Use Windows Restore

3. What is a botnet?

  • Software that automates networks
  • A program that sends emails repeatedly infecting other computers who open it
  • A collection of malware stored in a network
  • A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.

4. What is rogue security software?

  • Security software that has been compromised to not pick up certain threats
  • Security software that is no longer being used for the purpose that was intended due to an exploit or hacker.
  • A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed
  • Security software that considers data files or programs as viruses, when they are not.

5. What is an example of a "419" Scam

  • Someone who uses social engineering to gain access to your computer or personal information
  • Someone who sends you an email in hopes you open an attachment which contains a virus
  • When you download a program that appears harmless, but it actually installs spyware on your computer
  • A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you

6. What is the main difference between spyware and other malware?

  • There is no difference
  • Spyware that slows down a computer by sending statistics to an unknown source, while malware only includes threats from inside your own computer
  • Malware monitors data usage, while spyware infects your computer with viruses
  • Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind.

7. What is a backdoor?

  • A vulnerability in software that allows someone to bypass the normal authentication process
  • It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer
  • It is where viruses store their source code and begin to replicate
  • It is a way for spyware to leave a system without any trace of it being there

8. Which of the following sites provide services for users to setup disposable emails?

  • jetable.org
  • gmail.com
  • yahoo.com
  • hotmail.com

9. Virus infection via email attachments can be minimized using which of the following?

  • Opening attachments from external hard drives
  • Copying attachments to special directories before opening them
  • Right clicking attachments
  • Deleting mail containing attachments from unknown senders

10. In order to help prevent spam, a tarpit performs which of the following functions?

  • traps suspected spam messages
  • routes suspected spam to special enclaves in the system
  • acts as a desirable mail server in order to lure spammers
  • delivers suspected spam messages more slowly
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook