Computer Security
Computer Security
QUESTION BANK
1. ……… is a branch of information technology 9. Softwares such as Viruses, Worms and
known as information security. Trojan Horses that have a malicious
(1) Computer security (2) Cyber security content, is known as [IBPS Clerk 2014]
(3) IT security (1) Malicious software (malware)
(4) All of these (2) adware (3) scareware
2. It takes advantages of basic hardware and (4) spyware (5) firewall
software security characteristics. 10. Viruses, trojan horses and worms are
(1) System design [IBPS Clerk 2012]
(2) Data access control (1) able to harm computer system
(3) System access control (2) unable to detect if present on computer
(4) None of these (3) user-friendly applications
3. Verification of a login name and password (4) harmless applications resident on computer
is known as [IBPS Clerk 2014]
(5) None of the above
(1) configuration (2) accessibility 11. It is a self-replicating program that infects
(3) authentication (4) logging in computer and spreads by inserting copies of
(5) Other than those given as options itself into other executable code or
documents.
4. If you are allowing a person on the network (1) Keylogger (2) Worm
based on the credentials to maintain the (3) Virus (4) Cracker
security of your network, then this act
refers to the process of [IBPS PO 2016] 12. A computer virus is
(1) deliberately created
(1) Authentication (2) Automation
(2) created accidently
(3) Firewall (4) Encryption
(5) None of these (3) produced as result of some program error
(4) All of the above
5. The scrambling of code is known as
(1) Encryption (2) Firewalling 13. …… are often delivered to a PC through an
mail attachment and are often designed to
(3) Scrambling (4) Deception
do harm. [IBPS PO 2015]
(5) Permuting
(1) Portals
6. The main reason to encrypt a file is to (2) Spam
(1) reduce its size (3) Viruses
(2) secure it for transmission (4) Other than those given as options
(3) prepare it for backup (5) E-mail messages
(4) include it in the start-up sequence
14. Which of the following refers to dangerous
7. Cracked softwares are another source of programs that can be ‘caught’ of opening
(1) E-mail attack (2) Virus attack E-mail attachments and downloading
(3) Trojan horse (4) All of these software from the Internet? [SBI PO 2014]
8. A malware is an (1) Utility (2) Virus
(1) program (2) hardware (3) Honey Pot (4) Spam
(3) a person (4) None of these (5) App
152 Learn, Revise & Practice ~ Computer Awareness
15. A program designed to destroy data on your 24. Like a virus, it is also a self-replicating
computer which can travel to ‘infect’ other program. The difference between a virus
computers is called a [RBI Grade B 2012]] and it is that a worm does not create copies
(1) disease (2) torpedo (3) hurricane (4) virus of itself on one system it propagates
(5) infector through computer networks.
16. If your computer rebooting itself then it is (1) Keylogger (2) Worm
likely that [SBI Clerk 2012]
(3) Cracker (4) None of these
(1) it has a virus 25. A worm
(2) it does not have enough memory (1) can automatically move in network
(3) there is no printer (2) can only be transferred with human
(4) there has been a power surge intervention
(5) it needs a CD-ROM (3) worms are harmless
(4) None of the above
17. Computer virus is [IBPS Clerk 2011]
(1) a hardware 26. Worm is a program that infects computer
(2) windows tool and spreads by inserting copies of itself into
(3) a computer program other executable code or documents.
(4) a system software (1) Self attach (2) Self-replicating
(5) None of the above (3) Non-self-replicating (4) Hacking
18. Which among the following is related to the 27. A computer virus normally attaches itself to
internet and mail? another computer program known as a
(1) Boot-UP (2) Magnetic Tapes [IBPS PO 2015]
(3) Applications Software (1) host program (2) target program
(4) Paging (3) backdoor program (4) bluetooth
(5) Virus (5) trojan horse
19. The first PC virus was developed in 28. These are program designed as to seem to
(1) 1980 (2) 1984 (3) 1986 (4) 1988 being or be doing one thing, but actually
20. The first computer virus is being or doing another.
(1) Trojan horses (2) Keylogger
(1) creeper (2) PARAM
(3) Worm (4) Cracker
(3) the famous (4) HARLIE
21. Which virus spreads in application 29. Viruses that fool a user into downloading
software? and/or executing them by pretending to be
useful applications are also sometimes
(1) Macro virus (2) Boot virus
called
(3) File virus (4) Antivirus
(1) Trojan horses (2) Keylogger
22. The ......... of a threat measures its potential (3) Worm (4) Cracker
impact on a system. [IBPS Clerk 2011]
(1) vulnerabilities (2) counter measures
30. A ......... is a small program embedded inside
(3) degree of harm (4) susceptibility of a GIF image.
(5) None of these (1) Web bug (2) cookie
(3) spyware application (4) spam
23. Which of the following is the type of
software that has self-replicating software 31. Hackers often gain entry to a network be
that causes damage to files and system? pretending to be at a legitimate computer
(1) Viruses (2) Trojan horses (1) spoofing (2) forging
(3) Bots (4) Worms (3) IP spoofing (4) All of these
Computer Security 153
32. It is a situation in which one person or 38. An act of sending e-mails or creating
program successfully masquerades as webpages that are designed to collect and
another by falsifying data and thereby individual’s online bank, credit card or
gaining illegitimate access. other login information?
(1) Sspoofing attack (2) Vulnerability scanner (1) Phishing (2) Spam
(3) Packet sniffer (4) Rootkit (3) Hacking (4) Cracking
33. Attempt to gain unauthorised access to a 39. ......... are attempts by individuals to obtain
user’s system or information by pretending confidential information from you by
to be the user? [IBPS RRB PO 2018] falsifying their identity.
(1) Spoofing (2) Hacker [IBPS PO 2011, IBPS Clerk 2013]
(3) Cracker (4) Phishing (1) Phishing trips (2) Computer viruses
(5) None of these (3) Spyware scams (4) Viruses
34. Which of the following enables to (5) Phishing scams
determine how often a user visited a 40. Which of the following is a criminal activity
Website? [IBPS Clerk 2014] attempting to acquire sensitive information
(1) Hacker (2) Spammer such as passwords, credit cards, debits by
(3) Phish (4) Identify theft masquerading as a trustworthy person or
(5) Cookie business in an electronic communication?
35. A person who uses his or her expertise to [IBPS Clerk 2010]
gain access to other people computers to get (1) Spoofing (2) Phishing
information illegally or do damage is a (3) Stalking (4) Hacking
[Allahabad Bank PO 2011] (5) None of these
Or 41. All of the following are examples of
A person who uses his expertise for real-security and privacy risks except
software? [IBPS RRB PO 2018] [SBI PO 2011, IBPS Clerk 2014]
(1) spammer (2) hacker (1) hackers (2) spam
(3) instant messenger (4) All of these (3) viruses (4) identify theft
(5) None of these (5) None of these
36. Hackers 42. Junk E-mail is also called
(1) all have the same motive [Union Bank of India 2011]
(2) are another name of users (1) spam (2) spoof
(3) many legally break into computer as long as (3) sniffer script (4) spool
they do not do any damage (5) None fo these
(4) are people who are allergic to computers 43. ……… is a type of electronic spam where
(5) break into other people’s computer unsolicited messages are sent by e-mail.
37. What is a person called who uses a (1) Trash mail (2) Cram mail
computer to cause harm to people or (3) Draft mail (4) Spam mail
destroy critical systems? [IBPS Clerk 2014] 44. Adware is something
(1) Cyber Terrorist (1) which is added to your computers
(2) Black-hat-Hacker (2) by adding this performance of your computer
(3) Cyber Cracker increases
(4) Hacktivist (3) software that gets different advertisement
(5) Other than those given as options (4) None of the above
154 Learn, Revise & Practice ~ Computer Awareness
45. It is a toolkit for hiding the fact that a 53. Which one of the following is a key
computer’s security has been compromised, function of firewall? [SBI PO 2010]
is a general description of a set of programs (1) Monitoring (2) Deleting
which work to subvert control of an (3) Copying (4) Moving
operating system from its legitimate (in (5) None of these
accordance with established rules)
54. Mechanism to protect network from outside
operators.
attack is
(1) Rootkit (2) Keylogger
(1) firewall (2) antivirus
(3) Worm (4) Cracker
(3) digital signature (4) formatting
46. It is a prepared application that takes
advantage of a known weakness. 55. A firewall operated by [SBI Clerk 2010]
ANSWERS
1. (4) 2. (1) 3. (3) 4. (1) 5. (1) 6. (2) 7. (2) 8. (1) 9. (1) 10. (1)
11. (3) 12. (1) 13. (3) 14. (2) 15. (4) 16. (1) 17. (3) 18. (5) 19. (3) 20. (1)
21. (1) 22. (3) 23. (4) 24. (2) 25. (1) 26. (2) 27. (5) 28. (1) 29. (1) 30. (3)
31. (3) 32. (1) 33. (1) 34. (1) 35. (2) 36. (5) 37. (3) 38. (1) 39. (1) 40. (2)
41. (2) 42. (1) 43. (4) 44. (3) 45. (1) 46. (1) 47. (2) 48. (1) 49. (4) 50. (3)
51. (3) 52. (1) 53. (1) 54. (1) 55. (3) 56. (2) 57. (3) 58. (1) 59. (2) 60. (2)
61. (1) 62. (2) 63. (3) 64. (4) 65. (4) 66. (1) 67. (2) 68. (2)