Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
89 views
10 pages
Cs MCQ 4
Uploaded by
shifara Tesfaye
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save cs mcq 4 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
89 views
10 pages
Cs MCQ 4
Uploaded by
shifara Tesfaye
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save cs mcq 4 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save cs mcq 4 For Later
You are on page 1
/ 10
Search
Fullscreen
1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz Computer Security Questions and Answers: ‘A Proxy server is used for which of the following? (a) To provide security against unauthorized users (b) To process client requests for web pages (c) To process client requests for database access (A) To provide TCP/IP ®View Passwords enable users to (a) get into the system quickly (b) make efficient use of time (c) retain confidentiality of files (A) simplify file structures Which will not harm computer resources? (a) firewall (b) Virus (c) Trojan horse (d) None of the above ntps:twwwexamsegg,comlcomputer-secury- megs. him! 261212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz oogle Why this ad? @ ‘A program designed to destroy data on your computer which can travel to “infect” other computers Is called a_ (a) disease (b) torpedo (c) hurricane (d) virus Trojan-Horse programs (a) are legitimate programs that allow unauthorized access (b) are hacker programs that do not show up on the system (©) really do not usually work (a) are usually immediately discovered Related: Major stock markets in the world Technology, no longer protected by copyright, and is available to everyone, Is considered to be: (a) proprietary (b) open, (c) experimental (q) in the public domain. ev What is a backup? (a) Restoring the information backup (b) An exact copy of a system's information (c) The ability to get a system up and running in the event of a system crash or failure hitps www. examsegg.com/computer-securty-megs hm ane1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz (d) All of these ‘Acomputer checks the __ of user names and passwords for a match before granting access. (a) Website (b) Network (c) Backup file (d) Data base All of the following are examples of real security and privacy risks, EXCEPT: (a) Hackers (b) Spam (c) Viruses (d) Identity theft Security violation due to (a) malicious (b) accidental (c) both (a) and (b) (d) none of these Related: Ist of Asian Countries and their Capitals __ is @ computer crime in which a criminal breaks into a computer system for exploring details of information etc. (a) Hacking (b) Spoofing (©) Eavesdropping (d) Phishing Question: What does SSL stand for? (a) Saving Sharing and Limits (b) Safe, Secured and Locked (c) Secure Socket Limbs (d) Secure Socket Layers Vier hitpsaiwww.examsegg.comicomputer-securty-mogs. him1272123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz The security of a system can be improved by (a) threat monitoring (b) audit log (c) both (a) and (b) (d) none of these Related: who is the largest Bank in the US. Which of the following would most likely NOT be a symptom of a virus? (a) Existing program files and icons disappear (b) The CD-ROM stops functioning (c) The Web browser opens to an unusual home page (d) Odd messages or images are displayed on the screen ___ are viruses that are triggered by the passage of time or on a certain date. (a) Boot-sector viruses (b) Macro viruses (c) Time bombs. (d) Worms Verification of a login name and password is known as (a) configuration (b) accessibility (c) authentication (d) logging in © View Ans ___is a security protocol based on digital certificates. (a) Digital signature (b) Secure sockets layer protocol (c) Secure electronic transactions (d) None of these ® View Ans Worm was made up of (a) one program (b) two programs (c) three programs hitpsaiwww.examsegg.comicomputer-securty-mogs. him1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz (d) all of these Related: Currency of Europe countries The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: (a) robotics (b) simulation (©) computer forensics (4) animation Firewalls are used to protect against __ (a) unauthorized Attacks (b) virus Attacks (c) Data Driven Attacks (d) Fire Attacks ® View Answer Junk e-mail is also called (a) spam (b) spoof (c) sniffer script (a) spool ® View Answer Related: Axis bank logo Nowadays, phishing has become a criminal practice of using social engineering. For which of the following ? (a) Social networking sites (b) Mobile Phones (c) E-mail (d) Cyber cafes © View Ans Back up of the data files will help to prevent (a) loss of confidentiality (b) duplication of data (©) virus infection hitps www. examsegg.com/computer-securty-megs hm1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz (d) loss of data What is backup? (a) Adding more components to your network (b) Protecting data by copying it from the original source to a different destination (c) Filtering old data from new data (d) Accessing data on tape ® View Answer __can be used to minimize the risk of security breaches or viruses. (a) Firewall (b) Backups (c) Encryption (d) Digital signature ® View Answer Related: the Cube questions Software, such as viruses, worms and Trojan horses, that has a malicious intent is known as: (a) spyware (b) adware (c) spam. (a) malware ads by Google Wy ths ad? A__ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (a) system virus (b) Trojan horse virus (6) file virus (d) None of these ev The digital signature Is: (a) A form of security for electronic records hitps www. examsegg.com/computer-securty-megs hm me1272123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz (b) Copy (c) Task (qd) Area Arresult of a computer virus can not lead to __ (a) Disk Crash (b) Mother Board Crash (c) Corruption of programs (d) Deletion of files Related: list of countries in Oceania ___ Is science that attempts to produce machines that display the same type of intelligence that humans do (a) Nanoscience (b) Nanotechnology () Simulation (d) Artificial intelligence e If you receive an e-mail from someone you don’t know, what should you do ? (a) Forward it to the police immediately (b) Delete it without opening it (c) Open it and respond to them saying you don’t know them (d) Reply and ask them for their personal information Secret key is used in (a) Public key cryptography (b) Symmetric cryptography (c) Asymmetric cryptography (d) none __ Isa specialized form of online identity theft. (a) Spoofing (b) Unauthorized disclosure (c) Eavesdropping hitpsaiwww.examsegg.comicomputer-securty-mogs. him1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz (d) Phishing Related: Petroleum Quiz Online ___ Involves some one masquerading as someone else. (a) Spoofing (b) Unauthorized action (c) Eavesdropping (d) Phishing When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as _ (a) Spoofing (b) Unauthorized disclosure (c) Eavesdropping (d) Phishing ‘A competitor or an unhappy customer can alter a website so that it refuses services to potential clients. This is known as __ (a) Unauthorized action (b) Unauthorized disclosure (c) Eavesdropping (d) Phishing can catch the transmissions to obtain customers sensitive information (a) Firewall (b) Antivirus (c) Hackers (a) None Viet __ Is online identity theft. (a) Eavesdropping (b) Phishing (c) Spoofing (d) None of these hitps www. examsegg.com/computer-securty-megs hm1212123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz Related: Equation of a straight line maths questions Which of the following is not a risk in internet based transaction (a) eavesdropping (>) spoofing (c) encryption (d) unauthorized action A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is (a) encryption (b) firewalls (c) digital certificates (d) digital signature __ are electronic files that are used to uniquely identify people and resources over the internet (a) Digital signature (b) Digital certificate (c) Encryption recourse (a) None An electronic file that uniquely identifies individuals and websites on the Internet and enables secure, confidential communications. (a) Digital signature (b) Digital certificates (c) Encryption (d) Firewalls Related: internet question ___Is designed to protect a person’s personal information. (a) Data integrity (b) Cyber law (c) Private legislation (d) None hitps www. examsegg.com/computer-securty-megs hm 0161272123, 950 PM 30+ Computer Security Muliple Choice Questions and Answers - Quiz This acts like a gatekeeper that examines each user’s identification before allowing them to enter the organization's internal networks. (a) Antivirus program (b) Biometrics (c) Fire wall (d) none SSL is the most widely deployed (a) Security protocol (b) Data encryption (c) Cryptography (d) None __ Is the process of coding and scrambling of messages to prevent unauthorized access to understanding of data being transmitted (a) Cryptography (b) Encryption (c) Security key (d) none ___is used to keep transmission private through the use of data encryption techniQuestion: (a) Data encryption (>) Cryptography (c) Security key (a) None Related: biggest stock exchange in the world The attacker monitors the data between the shoppers’ computer and the server (a) Spoofing (b) snoofing (©) Sniffing (d) none The private content of a transaction, if unprotected, can be intercepted when it goes through the route over the internet is (a) spoofing hitpsaiwww.examsegg.comicomputer-securty-mogs. him ane
You might also like
Is Awareness Quiz Answers Final
PDF
No ratings yet
Is Awareness Quiz Answers Final
36 pages
ICICI Bank PO Exam 2010 - Computer General Awareness Banking and Career
PDF
29% (7)
ICICI Bank PO Exam 2010 - Computer General Awareness Banking and Career
7 pages
BIG-D Computer Security
PDF
No ratings yet
BIG-D Computer Security
15 pages
Security Practice
PDF
No ratings yet
Security Practice
16 pages
Assignment 1
PDF
No ratings yet
Assignment 1
8 pages
Sever Mode Security
PDF
No ratings yet
Sever Mode Security
4 pages
Final Test CyberSecurity 2022
PDF
No ratings yet
Final Test CyberSecurity 2022
8 pages
ICICI Bank PO Previous Year Papers Computer Min
PDF
No ratings yet
ICICI Bank PO Previous Year Papers Computer Min
7 pages
Computer Awareness PDF
PDF
100% (1)
Computer Awareness PDF
7 pages
41 - MCQ's With Solutions
PDF
No ratings yet
41 - MCQ's With Solutions
14 pages
(WWW - Entrance-Exam - Net) - ICICI Bank PO Sample Paper 4
PDF
No ratings yet
(WWW - Entrance-Exam - Net) - ICICI Bank PO Sample Paper 4
7 pages
Computer General Awareness For Bank PO 2010: Search
PDF
No ratings yet
Computer General Awareness For Bank PO 2010: Search
11 pages
Cyber Security Questions
PDF
100% (1)
Cyber Security Questions
9 pages
Cyber Security - Quizizz
PDF
No ratings yet
Cyber Security - Quizizz
8 pages
Cybersecurity SOC MCQ
PDF
No ratings yet
Cybersecurity SOC MCQ
16 pages
Practice Assessment
PDF
No ratings yet
Practice Assessment
26 pages
Cyber Security MCQ
PDF
100% (6)
Cyber Security MCQ
2 pages
Comptia 501
PDF
No ratings yet
Comptia 501
200 pages
CH 07
PDF
100% (1)
CH 07
10 pages
MIS 7th Edition Bidgoli Test Bank 1
PDF
100% (78)
MIS 7th Edition Bidgoli Test Bank 1
21 pages
14 07.06.18 Cyber Security Awareness
PDF
No ratings yet
14 07.06.18 Cyber Security Awareness
9 pages
Questions Bank
PDF
No ratings yet
Questions Bank
11 pages
Ias2 - Recall Quiz Online
PDF
No ratings yet
Ias2 - Recall Quiz Online
3 pages
CNS Up
PDF
No ratings yet
CNS Up
108 pages
Cybersecurity Internet Security MCQs 250
PDF
No ratings yet
Cybersecurity Internet Security MCQs 250
41 pages
Sic Main Final MCQ
PDF
No ratings yet
Sic Main Final MCQ
70 pages
Information - Security MOCK 2025
PDF
No ratings yet
Information - Security MOCK 2025
8 pages
Network Information Security NIS
PDF
No ratings yet
Network Information Security NIS
37 pages
CCC Cyber Security 100 MCQ
PDF
No ratings yet
CCC Cyber Security 100 MCQ
27 pages
Cyber Security Quiz
PDF
No ratings yet
Cyber Security Quiz
27 pages
Cyber Security
PDF
No ratings yet
Cyber Security
16 pages
Computer Quiz
PDF
No ratings yet
Computer Quiz
4 pages
New Microsoft Word Document
PDF
No ratings yet
New Microsoft Word Document
7 pages
DATA SECURITY Worksheet
PDF
100% (1)
DATA SECURITY Worksheet
3 pages
InSem Midterm MCQ
PDF
No ratings yet
InSem Midterm MCQ
7 pages
Sic Final (E-Next - In) (E-Next - In)
PDF
No ratings yet
Sic Final (E-Next - In) (E-Next - In)
56 pages
Grade8 No1
PDF
No ratings yet
Grade8 No1
5 pages
Cyber Security Internal Paper 2
PDF
No ratings yet
Cyber Security Internal Paper 2
3 pages
CyberSecurity MCQ Set 2 15Qs
PDF
No ratings yet
CyberSecurity MCQ Set 2 15Qs
4 pages
Ciso2 0
PDF
No ratings yet
Ciso2 0
6 pages
Section A
PDF
No ratings yet
Section A
6 pages
Jawahar Computer Sansthan
PDF
No ratings yet
Jawahar Computer Sansthan
33 pages
Introduction of Cyber Security Vac MCQ Question Pattern
PDF
No ratings yet
Introduction of Cyber Security Vac MCQ Question Pattern
28 pages
CEH Cryptography-Cloud
PDF
No ratings yet
CEH Cryptography-Cloud
15 pages
Sem-6, Cyber Security
PDF
No ratings yet
Sem-6, Cyber Security
16 pages
Chapter 3 Network Security: D) Employee in A Firm Outside Target
PDF
No ratings yet
Chapter 3 Network Security: D) Employee in A Firm Outside Target
13 pages
SY0-701 Practice Questions & Answers
PDF
100% (1)
SY0-701 Practice Questions & Answers
52 pages
606U4 NetworkSecurity
PDF
No ratings yet
606U4 NetworkSecurity
19 pages
Test MCC
PDF
No ratings yet
Test MCC
4 pages
Mubeena - CS - Grade 7 - Term - II - WS 5-Answers
PDF
No ratings yet
Mubeena - CS - Grade 7 - Term - II - WS 5-Answers
6 pages
MCQ Questions Cybersecurity
PDF
No ratings yet
MCQ Questions Cybersecurity
5 pages
BCA Internet Security Important MCQ
PDF
No ratings yet
BCA Internet Security Important MCQ
9 pages
Cyber Security
PDF
50% (2)
Cyber Security
40 pages
100 Multiple-Choice Questions
PDF
No ratings yet
100 Multiple-Choice Questions
20 pages
Choice
PDF
No ratings yet
Choice
28 pages
Siber Güvenlik Sorular
PDF
No ratings yet
Siber Güvenlik Sorular
14 pages
4.cyber Security Techniques
PDF
No ratings yet
4.cyber Security Techniques
5 pages
Network Security Researc H Paper
PDF
No ratings yet
Network Security Researc H Paper
104 pages
Hcu Management
PDF
No ratings yet
Hcu Management
7 pages
Chapter 1-Introduction
PDF
No ratings yet
Chapter 1-Introduction
26 pages
Computersecurity Outline
PDF
100% (1)
Computersecurity Outline
5 pages
Cs MCQ 2
PDF
No ratings yet
Cs MCQ 2
5 pages