SlideShare a Scribd company logo
6
Most read
8
Most read
12
Most read
COMPUTER SECURITY Notes + MCQ BY: SONU (HEETSON)
Helpful for IBPS, SBI (Bank PO & Clerk), SSC, Railway, Police and all Other Competitive Exams
Computer security is also known as cyber security or IT security. Computer security is a branch of information
technology known as information security, which is intended to protect computers. It is the protection of computing
systems and the data that they store or access.
Methods to Provide Protection
There are four primary methods to provide protection
1. System Access Control It ensures that unauthorized users do not get into the system by encouraging authorised users
to be security conscious.
2. Data Access Control It monitors who can access the data, and for what purpose. Your system might support
mandatory access controls with these. The system determines access rules based on the security levels of the people,
the files and the other objects in your system.
3. System and Security Administration It performs offline procedures that make or break secure system.
4. System Design It takes advantages of basic hardware and software security characteristics.
Components of Computer Security
Computer security is associated with many core areas.
Basic components of computer security system are as follows
1. Confidentiality It ensures that data is not accessed by any unauthorised person.
2. Integrity It ensures that information is not altered by any unauthorised person in such a way that it is not detectable
by authorised users.
3. Authentication It ensures that users are the persons they claim to be.
4. Access Control It ensures that users access only those resources that they are allowed to access.
5. Non-Repudiation It ensures that originators of messages cannot deny they are not sender of the message.
6. Availability It ensures that systems work promptly and service is not denied to authorised users.
7. Privacy It ensures that individual has the right to use the information and allows another to use that information.
8. Stenography It is an art of hiding the existence of a message. It aids confidentiality and integrity of the data.
9. Cryptography It is the science of writing information in a ‘hidden’ or ‘secret’ form and an ancient art. It protects the
data in transmit and also the data stored on the disk.
Some terms commonly used in cryptography are as follows
(i) Plain text It is the original message that is an input.
(ii) Cipher It is a bit-by-bit or character-bycharacter transformation without regard to the meaning of the message.
(iii) Cipher Text It is the coded message or the encrypted data.
(iv) Encryption It is the process of converting plain text to cipher text, using an encryption algorithm.
(v) Decryption It is the reverse of encryption, i.e. converting cipher text to plaint ext.
Sources of Cyber Attack
The most potent and vulnerable threat of computer users is virus attacks. A computer virus is a small software program
that spreads from one computer to another and that interferes with computer operation. It is imperative for every
computer user to be aware about the software and its programs that can help to protect the personal computers from
attacks.
The sources of attack can be follow
1. Downloadable Programs Downloadable files are one of the best possible sources of virus. Any type of executable file
like games, screen saver are one of the major sources. If you want to download programs from the Internet then it is
necessary to scan every program before downloading them.
2. Cracked Software These softwares are another source of virus attacks. Such cracked forms of illegal files contain virus
and bugs that are difficult to detect as well as to remove. Hence, it is always a preferable
option to download software from the appropriate source.
3. E-mail Attachments These attachments are the most common source of viruses. You must handle E-mail attachments
with extreme care, especially if the E-mail comes from an unknown sender.
4. Internet Majority of all computer users are unaware as when viruses attack computer systems. Almost all computer
users click or download everything that comes their way and hence unknowingly invites the possibility of virus attacks.
5. Booting from Unknown CD When the computer system is not working, it is a good practice to remove the CD. If you
do not remove the CD, it may start to boot automatically from the disk which enhances the possibility of virus attacks.
Malware : Threats to Computer Security
Malware stands for malicious software. It is a broad term that refers to a variety of malicious programs that are used to
damage computer system, gather sensitive information or gain access to private computer systems. It includes
computer viruses, worms, trojan horses, rootkits, spyware, adware, etc.
Some of them are described below
Virus
VIRUS stands for Vital Information Resources Under Siege. Computer viruses or perverse softwares are small programs
that can negatively affect the computer. It obtains control of a PC and directs it to perform unusual and often
destructive actions. Viruses are copied itself and attached itself to other programs which further spread the infection.
The virus can affect or attack any part of the computer software such as the boot block, operating system, system areas,
files and application programs. The first computer virus Creeper created in 1971.
Types of Virus
Some common types of viruss are as follows
1. Resident Virus It fixes themselves into the system’s memory and get activated whenever the operating system runs
and infects all the files that are opened. It hides in the RAM and stays there even after the malicious code is executed.
e.g. Randex, Meve etc.
2. Direct Action Virus It comes into action when the file containing the virus is executed. It infects files in the folder that
are specified in the AUTOEXEC.bat file path. e.g. Vienna virus.
3. Overwrite Virus It deletes the information contained in the files that it infects, rendering them partially or totally
useless, once they have been infected. e.g. Way, Trj.Reboot, Trivial.88.D etc.
4. Boot Sector Virus It is also called Master Boot Sector virus or Master Boot Record virus. This type of virus affects the
boot sector of a hard disk. Brain was the first PC boot sector virus created in 1986. e.g. Polyboot.B, AntiEXE etc.
5. Macro Virus It infects files that are created using certain applications or programs that contain macros, like .doc, .xls,
.ppt etc. e.g. Melissa.A
6. File System Virus It is also called Cluster virus or Directory virus. It infects the directory of the computer by changing
the path that indicates the location of a file. e.g. Dir-2 virus
7. Polymorphic Virus It encrypts or encodes itself in an encrypted way, every time it infects a system. This virus then
goes on to create a large number of copies. e.g. Elkern, Tuareg etc.
8. FAT Virus It is used to store all the information about the location of files, unusable space, etc. e.g. Link virus etc.
9. Multipartite Virus It may spread in multiple ways such as the operating system installed or the existence of certain
files. e.g. Flip.
10. Web Scripting Virus Many Websites execute complex code in order to provide interesting content. These sites are
sometimes created with purposely infected code. e.g. JS Fortnight
Effects of Virus
There are many different effects that viruses can have on your computer, depending on the types of virus.
Some viruses can
(i) monitor what you are doing.
(ii) slow down your computer’s performance.
(iii) destroy all data on your local disk.
(iv) affect on computer networks and the connection to Internet.
(v) increase or decrease memory size.
(vi) display different types of error messages.
(vii) decrease partition size.
(viii)alter PC settings.
(ix) display arrays of annoying advertising.
(x) extend boot times.
(xi) create more than one partitions.
Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other
computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to
access it. Worms are hard to detect because they are invisible files.
e.g. Bagle, I love you, Morris, Nimda etc.
Trojan
A Trojan, or Trojan horse, is a non-self-replicating type of malware which appears to perform a desirable function but
instead facilitates unauthorized access to the user’s computer system. Trojans do not attempt to inject themselves into
other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may
use drive by downloads or install via online games or Internet driven applications in order to reach target computers.
Unlike viruses, Trojan horses do not replicate themselves.
e.g. Beast, Sub7.Zeus, ZeroAccess Rootkit etc.
Spyware
It is a program which is installed on a computer system to spy on the system owner’s activity and collects all the
information which is misused afterwards. It tracks the user’s behaviour and reports back to a central source.
These are used for either legal or illegal purpose. Spyware can transmit personal information to another person’s
computer over the Internet.
e.g. CoolWeb Search, FinFisher, Zango, Zlob Trojan, Keyloggers etc.
Symptoms of Malware Attack
There is a list of symptoms of malware attack which indicates that your system is infected with a computer malware.
Some primary symptoms of malware attack are as follows
(i) Odd messages are displaying on the screen.
(ii) Some files are missing.
(iii) System runs slower.
(iv) PC crashes and restarts again and again.
(v) Drives are not accessible.
(vi) Antivirus software will not run or installed.
(vii) Unexpected sound or music plays.
(viii) The mouse pointer changes its graphic.
(ix) System receives strange E-mails containing odd attachments or viruses.
(x) PC starts performing functions like opening or closing window, running programs on its own.
Some Other Threats to Computer Security
There are some other threats to computer security which are described below
1. Spoofing It is the technique to access the unauthorized data without concerning to the authorized user. It accesses
the resources over the network. It is also known as ‘Masquerade’. IP spoofing is a process or technique to enter in
another computer by accessing its IP address. It pretends to be a legitimate user and access to its computer via a
network.
2. Salami Technique It diverts small amounts of money from a large number of accounts maintained by the system.
3. Hacking It is the act of intruding into someone else’s computer or network. Hacking may result in a Denial of Service
(DoS) attack. It prevents authorized users from accessing the resources of the computer. A hacker is someone, who does
hacking process.
4. Cracking It is the act of breaking into computers. It is a popular, growing subject on Internet. Cracking tools are widely
distributed on the Internet. They include password crackers, trojans, viruses, wardialers, etc.
5. Phishing It is characterized by attempting to fraudulently acquire sensitive information such as passwords, credit
cards details etc. by masquerading as a trustworthy person.
6. Spam It is the abuse of messaging systems to send unsolicited bulk messages in the form of E-mails. It is a subset of
electronic spam involving nearly identical messages sent to numerous recipients by E-mails.
7. Adware It is any software package which automatically renders advertisements in order to generate revenue for its
author. The term is sometimes used to refer the software that displays unwanted advertisements.
8. Rootkit It is a type of malware that is designed to gain administrative level control over a computer system without
being detected.
Solutions to Computer Security Threats
Some safeguards (or solutions) to protect a computer system from accidental access, are described below
Antivirus Software
It is an application software that is designed to prevent, search for, detect and remove viruses and other malicious
softwares like worms, trojans, adware and more. It consists of computer programs that attempt to identify threats and
eliminate computer viruses and other malware.
Some popular Antiviruses
(i) Avast
(ii) Avg
(iii) K7
(iv) Kaspersky
(v) Trend Micro
(vi) Quick Heal
(vii) Symantec
(viii) Norton
(ix) McAfee
Digital Certificate
It is the attachment to an electronic message used for security purposes. The common use of a digital certificate is to
verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode
a reply. It provides a means of proving your identity in electronic transactions.
Digital Signature
It is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the
signer of a document, and also ensure that the original content of the message or document that has been sent is
unchanged.
Firewall
It can either be software based or hardware based and is used to help in keeping a network secure. Its primary objective
is to control the incoming and outgoing network traffic by analysing the data packets and determining whether it should
be allowed through or not, based on a predetermined rule set. A network’s firewall builds a bridge between an internal
network that is assumed to be secure and trusted, and another network, usually an external (inter) network, such as the
Internet, that is not assumed to be secure and trusted. A firewall also includes or works with a proxy server that makes
network requests on behalf of workstation users.
Password
It is a secret word or a string of characters used for user authentication to prove identity or access approval to gain
access to a resource. A password is typically somewhere between 4 to 16 characters, depending on how the computer
system is setup. When a password is entered, the computer system is careful not to display the characters on the display
screen, in case others might see it.
There are two common modes of password as follows
(i) Weak Password Easily remember just like names, birth dates, phone number etc.
(ii) Strong Password Difficult to break and a combination of alphabets and symbols.
File Access Permission
Most current file systems have methods of assigning permissions or access rights to specific user and group of users.
These systems control the ability of the users to view or make changes to the contents of the file system. File access
permission refers to privileges that allow a user to read, write or execute a file.
There are three specific file access permissions as follows
(i) Read Permission If you have read permission of a file, you can only see the contents. In case of directory, access
means that the user can read the contents.
(ii) Write Permission If you have write permission of a file, you can only modify or remove the contents of a file. In case
of directory, you can add or delete contents to the files of the directory.
(iii) Execute Permission If you have execute permission of a file, you can only execute a file. In case of directory, you
must have execute access to the bin directory in order to execute it or cd command.
Terms Related to Security
1. Eavesdropping The attacker monitors transmissions for message content.
2. Masquerading The attacker impersonates an authorised user and thereby gain certain unauthorized privilege.
3. Patches It is a piece of software designed to fix problems with a computer program or its
supporting data. This includes fixing security vulnerabilities and other bugs and improving the usability and
performance.
4. Logic Bomb It is a piece of code intentionally inserted into a computer’s memory that will set off a malicious function
when specified conditions are met. They are also called slag code and does not replicate itself.
5. Application Gateway This applies security mechanisms to specific applications such as File Transfer Protocol (FTP) and
Telnet services.
6. Proxy Server It can act as a firewall by responding to input packets in the manner of an application while blocking
other packets. It hides the true network addresses and used to intercept all messages entering and leaving the network.
Highlights
■ Keylogger is a software program designed to record every keystroke on the machine on which it runs.
■ The legal right to use software based on specific restrictions is granted via Software license.
■ Payloads is code in the worm designed to do more than spread the worm. Bomb virus has a delayed payload
■ Software Piracy means copying of data or computer software without the owner’s permission.
1. It takes advantages of basic hardware and software security characteristics.
(1) System design (2) Data access control (3) System access control (4) None of these
Ans. 1
2. If you are allowing a person on the network based on the credentials to maintain the security of your network, then
this act refers to the process of [IBPS PO 2016]
(1) Authentication (2) Automation (3) Firewall (4) Encryption (5) None of these
Ans. 1
3. Cracked softwares are another source of
(1) E-mail attack (2) Virus attack (3) Trojan horse (4) All of these
Ans. 2
4. A malware is an
(1) program (2) hardware (3) a person (4) None of these
Ans. 1
5. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable
code or documents.
(1) Keylogger (2) Worm (3) Virus (4) Cracker
Ans. 3
6. A computer virus is
(1) deliberately created (2) created accidently (3) produced as result of some program error (4) All of the above
Ans. 1
7. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and
downloading software from the Internet? [SBI PO 2014]
(1) Utility (2) Virus (3) Honey Pot (4) Spam (5) App
Ans. 2
8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a
[RBI Grade B 2012]
(1) disease (2) torpedo (3) hurricane (4) virus (5) infector
Ans. 4
9. Computer virus is [IBPS Clerk 2011]
(1) a hardware (2) windows tool (3) a computer program (4) a system software (5) None of the above
Ans. 3
10. Which among the following is related to the internet and mail?
(1) Boot-UP (2) Magnetic Tapes (3) Applications Software (4) Paging (5) Virus
Ans. 5
11. The first PC virus was developed in
(1) 1980 (2) 1984 (3) 1986 (4) 1988
Ans. 3
12. Which virus spreads in application software?
(1) Macro virus (2) Boot virus (3) File virus (4) Antivirus
Ans. 1
13. Which of the following is the type of software that has self-replicating software that causes damage to files and
system?
(1) Viruses (2) Trojan horses (3) Bots (4) Worms
Ans. 4
14. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create
copies of itself on one system it propagates through computer networks.
(1) Keylogger (2) Worm (3) Cracker (4) None of these
Ans. 2
15. A worm
(1) can automatically move in network (2) can only be transferred with human intervention (3) worms are harmless (4)
None of the above
Ans. 1
16. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or
documents.
(1) Self attach (2) Self-replicating (3) Non-self-replicating (4) Hacking
Ans. 2
17. A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]
(1) host program (2) target program (3) backdoor program (4) Bluetooth (5) Trojan horse
Ans. 5
18. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
(1) Trojan horses (2) Keylogger (3) Worm (4) Cracker
Ans. 1
19. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also
sometimes called
(1) Trojan horses (2) Keylogger (3) Worm (4) Cracker
Ans. 1
20. A ......... is a small program embedded inside of a GIF image.
(1) Web bug (2) cookie (3) spyware application (4) spam
Ans. 3
21. Hackers often gain entry to a network be pretending to be at a legitimate computer
(1) spoofing (2) forging (3) IP spoofing (4) All of these
Ans. 3
22. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby
gaining illegitimate access.
(1) Spoofing attack (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit
Ans. 1
23. Attempt to gain unauthorized access to a user’s system or information by pretending to be the user?
[IBPS RRB PO 2018]
(1) Spoofing (2) Hacker (3) Cracker (4) Phishing (5) None of these
Ans. 1
24. Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014]
(1) Hacker (2) Spammer (3) Phish (4) Identify theft (5) Cookie
Ans. 1
25. A person who uses his or her expertise to gain access to other people computers to get information illegally or do
damage is a [Allahabad Bank PO 2011]
(1) Spammer (2) hacker (3) instant messenger (4) All of these (5) None of these
Ans. 2
26. Hackers
(1) All have the same motive
(2) are another name of users
(3) Many legally break into computer as long as they do not do any damage
(4) Are people who are allergic to computers
(5) break into other people’s computer
Ans. 5
27. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014]
(1) Cyber Terrorist (2) Black-hat-Hacker (3) Cyber Cracker (4) Hacktivist (5) Other than those given as options
Ans. 3
28. An act of sending e-mails or creating WebPages that are designed to collect and individual’s online bank, credit card
or other login information?
(1) Phishing (2) Spam (3) Hacking (4) Cracking
Ans. 1
29. ......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
[IBPS PO 2011, IBPS Clerk 2013]
(1) Phishing trips (2) Computer viruses (3) Spyware scams (4) Viruses (5) Phishing scams
Ans. 1
30. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit
cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010]
(1) Spoofing (2) Phishing (3) Stalking (4) Hacking (5) None of these
Ans. 2
31. All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014]
(1) hackers (2) spam (3) viruses (4) identify theft (5) None of these
Ans. 2
32. Junk E-mail is also called [Union Bank of India 2011]
(1) spam (2) spoof (3) sniffer script (4) spool (5) None of these
Ans. 1
33. ……… is a type of electronic spam where unsolicited messages are sent by e-mail.
(1) Trash mail
(2) Cram mail
(3) Draft mail
(4) Spam mail
Ans. 4
34. Adware is something
(1) which is added to your computers
(2) by adding this performance of your computer increases
(3) software that gets different advertisement
(4) None of the above
Ans. 3
35. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of
programs which work to subvert control of an operating system from its legitimate (in accordance with established
rules) operators.
(1) Rootkit (2) Keylogger (3) Worm (4) Cracker
Ans. 1
36. It is a prepared application that takes advantage of a known weakness.
(1) Security exploit (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit
Ans. 1
37. It is a tool used to quickly check computers on a network for known weaknesses.
(1) Security exploit (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit
Ans. 2
38. A ......... is anything that can cause harm.
(1) Vulnerability (2) phishing (3) threat (4) spoof
Ans. 1
39. An antivirus is a (n)
(1) program code
(2) computer
(3) company name
(4) application software
(5) None of these
Ans. 4
40. Antivirus software is an example of
(1) business software
(2) an operating system
(3) a security
(4) an office suite
Ans. 3
41. A digital signature is an [SBI Clerk 2011]
(1) scanned signature
(2) signature in binary form
(3) encrypting information
(4) handwritten signature
(5) None of the above
Ans. 3
42. To protect yourself from computer hacker intrusions, you should install a [RBI Grade B 2012]
(1) firewall (2) mailer (3) macro (4) script (5) None of these
Ans. 1
43. Which one of the following is a key function of firewall? [SBI PO 2010]
(1) Monitoring
(2) Deleting
(3) Copying
(4) Moving
(5) None of these
Ans. 1
44. Mechanism to protect network from outside attack is
(1) firewall (2) antivirus (3) digital signature (4) formatting
Ans. 1
45. A firewall operated by [SBI Clerk 2010]
(1) the pre-purchase phase
(2) isolating intranet from extranet
(3) screening packets to/from the network and provide controllable filtering of network traffic
(4) All of the above
(5) None of the above
Ans. 3
46. Coded entries which are used to gain access to a computer system are called
(1) Entry codes (2) Passwords (3) Security commands (4) Code words
Ans. 2
47. Password enables users to
(1) get into the system quickly (2) make efficient use of time (3) retain confidentiality of files (4) simplify file structure
Ans. 3
48. Which of the following is the combination of numbers, alphabets along with username used to get access to user
account?
(1) Password
(2) Username
(3) Titlename
(4) Host-Id
Ans. 1
49. ……… refers to privileges that allow a user to read, write or execute a file.
(1) Authentication
(2) File access permission
(3) Password
(4) Firewall
Ans. 2
50. The unauthorized real-time interception of a private communication such as a phone call, instant message known as
(1) replay
(2) eavesdropping
(3) patches
(4) payloads
(5) None of these
Ans. 2
51. Vendor created program modifications are called [Allahabad Bank PO 2011]
(1) patches (2) Antivirus (3) hales (4) fixes (5) overlaps
Ans. 1
52. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself ? [SBI PO 2011]
(1) Trojan horse (2) Logic bomb
(3) Cracker (4) Firewall
Ans. 2
53. Some viruses have a delayed payload, which is sometimes called a
(1) time (2) antivirus (3) bomb (4) All of these
Ans. 3
54. Which was the first PC boot sector virus?
(1) Creeper (2) Payload (3) Bomb (4) Brain
Ans. 4
55. It hides the true network addresses and used to intercept all messages entering and leaving the network.
(1) Logic bomb (2) Firewall (3) Patches (4) Proxy server
Ans. 4
56. It is a software program designed to record (log) every keystroke on the machine on which it runs.
(1) Keylogger
(2) Worm
(3) Virus
(4) Cracker
Ans. 1
57. The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012]
(1) software privacy policy
(2) software license
(3) software password manager
(4) software log
(5) None of the above
Ans. 2
58. ……… refers to the unauthorized copying and distribution of software. [IBPS Clerk 2014] OR Illegal copying and
distribution of software is [IBPS RRB PO 2018]
(1) Hacking
(2) Software piracy
(3) Software literacy
(4) Cracking
(5) Copyright
Ans. 2
1. ……… is a branch of information technology known as information security.
(1) Computer security (2) Cyber security (3) IT security (4) All of these
2. Verification of a login name and password is known as [IBPS Clerk 2014]
(1) configuration (2) accessibility (3) authentication (4) logging in (5) Other than those given as options
3. The scrambling of code is known as
(1) Encryption (2) Firewalling (3) Scrambling (4) Deception (5) Permuting
4. The main reason to encrypt a file is to
(1) reduce its size (2) secure it for transmission (3) prepare it for backup (4) include it in the start-up sequence
5. Software such as Viruses, Worms and Trojan Horses that have a malicious content, is known as [IBPS Clerk 2014]
(1) Malicious software (malware) (2) adware (3) Scareware (4) spyware (5) firewall
6. Viruses, trojan horses and worms are [IBPS Clerk 2012]
(1) able to harm computer system
(2) unable to detect if present on computer
(3) user-friendly applications
(4) harmless applications resident on computer
(5) None of the above
7. …… are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015]
(1) Portals (2) Spam (3) Viruses (4) Other than those given as options (5) E-mail messages
8. If your computer rebooting itself then it is likely that [SBI Clerk 2012]
(1) it has a virus
(2) it does not have enough memory
(3) there is no printer
(4) there has been a power surge
(5) it needs a CD-ROM
9. The first computer virus is
(1) creeper (2) PARAM (3) the famous (4) HARLIE
10. The ......... of a threat measures its potential impact on a system. [IBPS Clerk 2011]
(1) vulnerabilities (2) counter measures (3) degree of harm (4) susceptibility (5) None of these
Click here for Answers
Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English]
https://bharatskills.in/best-computer-mcq-book-for-competitive-exams/
Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi)
https://bharatskills.in/computer-mcq-book-in-hindi-pdf/
HEETSON
Telegram https://t.me/Heetson_Official
WhatsApp Channel
@heetsoniti

More Related Content

What's hot (11)

PPTX
Transport mechanism biopharma
Maha Kiran
 
PPTX
Pharmacogenetics and Pharmacogenomics
Dr. Prashant Shukla
 
PPTX
Microbial Biotransformation
Vasundhara Kakade Pisal
 
PPTX
Genotoxicity
Narsingh Kashyap
 
PPT
Pharmaceutical Care -Definition and Principles (1).ppt
AyeshaShifa2
 
PPTX
Patient information-leaflets
TGA Australia
 
PPTX
Biotransformation.pptx
Arun Kumar
 
PPT
Excretion of drug (VK)
Dr. Abhavathi Vijay Kumar
 
PPTX
Absorption of drugs from extravascular routes
Rohan Jagdale
 
Transport mechanism biopharma
Maha Kiran
 
Pharmacogenetics and Pharmacogenomics
Dr. Prashant Shukla
 
Microbial Biotransformation
Vasundhara Kakade Pisal
 
Genotoxicity
Narsingh Kashyap
 
Pharmaceutical Care -Definition and Principles (1).ppt
AyeshaShifa2
 
Patient information-leaflets
TGA Australia
 
Biotransformation.pptx
Arun Kumar
 
Excretion of drug (VK)
Dr. Abhavathi Vijay Kumar
 
Absorption of drugs from extravascular routes
Rohan Jagdale
 

Similar to Computer/Cyber/IT Security MCQ Questions (20)

PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
PPTX
Final malacious softwares
Mirza Adnan Baig
 
PPTX
Computer viruses
SimiAttri
 
ODP
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
PPTX
BAIT1003 Chapter 11
limsh
 
PPTX
Securing The Computer From Viruses ...
Rahman_Hussain
 
PPT
Threats to an information system
Nimisha Walecha
 
PPTX
Computer Security Presentation
PraphullaShrestha1
 
DOC
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
WabiTiki
 
PPTX
Computer Virus ppt.pptx
PragatiKachhi1
 
PPTX
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
naveedabbas61
 
PDF
What are Computer Viruses.pdf
Blogger
 
PPTX
Computer Virus
Debraj Chatterjee
 
DOCX
External threats to information system: Malicious software and computer crimes
Souman Guha
 
PPTX
Computer Security and Ethics
Mohsin Riaz
 
PPT
computervirus.ppt
PritamSahoo16
 
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Joy Chakraborty
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Final malacious softwares
Mirza Adnan Baig
 
Computer viruses
SimiAttri
 
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
BAIT1003 Chapter 11
limsh
 
Securing The Computer From Viruses ...
Rahman_Hussain
 
Threats to an information system
Nimisha Walecha
 
Computer Security Presentation
PraphullaShrestha1
 
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
WabiTiki
 
Computer Virus ppt.pptx
PragatiKachhi1
 
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
naveedabbas61
 
What are Computer Viruses.pdf
Blogger
 
Computer Virus
Debraj Chatterjee
 
External threats to information system: Malicious software and computer crimes
Souman Guha
 
Computer Security and Ethics
Mohsin Riaz
 
computervirus.ppt
PritamSahoo16
 
Ad

More from SONU HEETSON (20)

PDF
PGT Engineering Drawing Tier-II Question Paper MCQ Solution
SONU HEETSON
 
PDF
ITI Engineering Drawing Question Paper MCQ Book Free Question Bank
SONU HEETSON
 
PDF
ITI Workshop Calculation and Science Question Paper MCQ Book Free Question Bank
SONU HEETSON
 
PDF
Surface Ornamentation Techniques Embroidery Question Paper ITI
SONU HEETSON
 
PDF
Plumber Trade Theory Question Paper 2015 NCVT
SONU HEETSON
 
PDF
Plumber ITI Cutting Tools Question in Hindi
SONU HEETSON
 
PDF
ITI Tractor Mechanic Question Paper Previous Year MCQ
SONU HEETSON
 
PDF
ITI Plumber Previous Year Question Paper Theory 2014
SONU HEETSON
 
PDF
ITI monthly test COPA Online Quiz December 2019 PDF
SONU HEETSON
 
PDF
ITI COPA Question Paper PDF 2017 Theory MCQ
SONU HEETSON
 
PDF
IGNOU ECONOMICS Question BECC132 BA Notes in Hindi
SONU HEETSON
 
PDF
IGNOU BA Economics notes PDF BECC131 Question in Hindi
SONU HEETSON
 
PDF
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
PDF
CSC Tec Exam Questions and Answers PDF in Hindi
SONU HEETSON
 
PDF
COPA Questions of Weekly Test 2020 with PDF
SONU HEETSON
 
PDF
ITI COPA PowerPoint MCQ Questions in Hindi
SONU HEETSON
 
PDF
COPA Operating System Most Important Questions
SONU HEETSON
 
PDF
COPA Networking MCQ Most Important Question
SONU HEETSON
 
PDF
COPA Monthly Test November 2018 for ITI Students
SONU HEETSON
 
PDF
COPA Apprentice exam Questions and answers PDF
SONU HEETSON
 
PGT Engineering Drawing Tier-II Question Paper MCQ Solution
SONU HEETSON
 
ITI Engineering Drawing Question Paper MCQ Book Free Question Bank
SONU HEETSON
 
ITI Workshop Calculation and Science Question Paper MCQ Book Free Question Bank
SONU HEETSON
 
Surface Ornamentation Techniques Embroidery Question Paper ITI
SONU HEETSON
 
Plumber Trade Theory Question Paper 2015 NCVT
SONU HEETSON
 
Plumber ITI Cutting Tools Question in Hindi
SONU HEETSON
 
ITI Tractor Mechanic Question Paper Previous Year MCQ
SONU HEETSON
 
ITI Plumber Previous Year Question Paper Theory 2014
SONU HEETSON
 
ITI monthly test COPA Online Quiz December 2019 PDF
SONU HEETSON
 
ITI COPA Question Paper PDF 2017 Theory MCQ
SONU HEETSON
 
IGNOU ECONOMICS Question BECC132 BA Notes in Hindi
SONU HEETSON
 
IGNOU BA Economics notes PDF BECC131 Question in Hindi
SONU HEETSON
 
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
CSC Tec Exam Questions and Answers PDF in Hindi
SONU HEETSON
 
COPA Questions of Weekly Test 2020 with PDF
SONU HEETSON
 
ITI COPA PowerPoint MCQ Questions in Hindi
SONU HEETSON
 
COPA Operating System Most Important Questions
SONU HEETSON
 
COPA Networking MCQ Most Important Question
SONU HEETSON
 
COPA Monthly Test November 2018 for ITI Students
SONU HEETSON
 
COPA Apprentice exam Questions and answers PDF
SONU HEETSON
 
Ad

Recently uploaded (20)

PPTX
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
PPTX
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
DOCX
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
 
PPTX
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
PPTX
JSON, XML and Data Science introduction.pptx
Ramakrishna Reddy Bijjam
 
PPTX
How to use _name_search() method in Odoo 18
Celine George
 
PDF
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
PDF
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
DOCX
DLL english grade five goof for one week
FlordelynGonzales1
 
PDF
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PPTX
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PPTX
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
PPTX
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PPTX
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
 
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
JSON, XML and Data Science introduction.pptx
Ramakrishna Reddy Bijjam
 
How to use _name_search() method in Odoo 18
Celine George
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
DLL english grade five goof for one week
FlordelynGonzales1
 
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
Iván Bornacelly - Presentation of the report - Empowering the workforce in th...
EduSkills OECD
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 

Computer/Cyber/IT Security MCQ Questions

  • 1. COMPUTER SECURITY Notes + MCQ BY: SONU (HEETSON) Helpful for IBPS, SBI (Bank PO & Clerk), SSC, Railway, Police and all Other Competitive Exams Computer security is also known as cyber security or IT security. Computer security is a branch of information technology known as information security, which is intended to protect computers. It is the protection of computing systems and the data that they store or access. Methods to Provide Protection There are four primary methods to provide protection 1. System Access Control It ensures that unauthorized users do not get into the system by encouraging authorised users to be security conscious. 2. Data Access Control It monitors who can access the data, and for what purpose. Your system might support mandatory access controls with these. The system determines access rules based on the security levels of the people, the files and the other objects in your system. 3. System and Security Administration It performs offline procedures that make or break secure system. 4. System Design It takes advantages of basic hardware and software security characteristics. Components of Computer Security Computer security is associated with many core areas. Basic components of computer security system are as follows 1. Confidentiality It ensures that data is not accessed by any unauthorised person. 2. Integrity It ensures that information is not altered by any unauthorised person in such a way that it is not detectable by authorised users. 3. Authentication It ensures that users are the persons they claim to be. 4. Access Control It ensures that users access only those resources that they are allowed to access. 5. Non-Repudiation It ensures that originators of messages cannot deny they are not sender of the message. 6. Availability It ensures that systems work promptly and service is not denied to authorised users. 7. Privacy It ensures that individual has the right to use the information and allows another to use that information. 8. Stenography It is an art of hiding the existence of a message. It aids confidentiality and integrity of the data. 9. Cryptography It is the science of writing information in a ‘hidden’ or ‘secret’ form and an ancient art. It protects the data in transmit and also the data stored on the disk. Some terms commonly used in cryptography are as follows (i) Plain text It is the original message that is an input. (ii) Cipher It is a bit-by-bit or character-bycharacter transformation without regard to the meaning of the message. (iii) Cipher Text It is the coded message or the encrypted data. (iv) Encryption It is the process of converting plain text to cipher text, using an encryption algorithm. (v) Decryption It is the reverse of encryption, i.e. converting cipher text to plaint ext. Sources of Cyber Attack The most potent and vulnerable threat of computer users is virus attacks. A computer virus is a small software program that spreads from one computer to another and that interferes with computer operation. It is imperative for every computer user to be aware about the software and its programs that can help to protect the personal computers from attacks. The sources of attack can be follow 1. Downloadable Programs Downloadable files are one of the best possible sources of virus. Any type of executable file like games, screen saver are one of the major sources. If you want to download programs from the Internet then it is necessary to scan every program before downloading them. 2. Cracked Software These softwares are another source of virus attacks. Such cracked forms of illegal files contain virus and bugs that are difficult to detect as well as to remove. Hence, it is always a preferable option to download software from the appropriate source.
  • 2. 3. E-mail Attachments These attachments are the most common source of viruses. You must handle E-mail attachments with extreme care, especially if the E-mail comes from an unknown sender. 4. Internet Majority of all computer users are unaware as when viruses attack computer systems. Almost all computer users click or download everything that comes their way and hence unknowingly invites the possibility of virus attacks. 5. Booting from Unknown CD When the computer system is not working, it is a good practice to remove the CD. If you do not remove the CD, it may start to boot automatically from the disk which enhances the possibility of virus attacks. Malware : Threats to Computer Security Malware stands for malicious software. It is a broad term that refers to a variety of malicious programs that are used to damage computer system, gather sensitive information or gain access to private computer systems. It includes computer viruses, worms, trojan horses, rootkits, spyware, adware, etc. Some of them are described below Virus VIRUS stands for Vital Information Resources Under Siege. Computer viruses or perverse softwares are small programs that can negatively affect the computer. It obtains control of a PC and directs it to perform unusual and often destructive actions. Viruses are copied itself and attached itself to other programs which further spread the infection. The virus can affect or attack any part of the computer software such as the boot block, operating system, system areas, files and application programs. The first computer virus Creeper created in 1971. Types of Virus Some common types of viruss are as follows 1. Resident Virus It fixes themselves into the system’s memory and get activated whenever the operating system runs and infects all the files that are opened. It hides in the RAM and stays there even after the malicious code is executed. e.g. Randex, Meve etc. 2. Direct Action Virus It comes into action when the file containing the virus is executed. It infects files in the folder that are specified in the AUTOEXEC.bat file path. e.g. Vienna virus. 3. Overwrite Virus It deletes the information contained in the files that it infects, rendering them partially or totally useless, once they have been infected. e.g. Way, Trj.Reboot, Trivial.88.D etc. 4. Boot Sector Virus It is also called Master Boot Sector virus or Master Boot Record virus. This type of virus affects the boot sector of a hard disk. Brain was the first PC boot sector virus created in 1986. e.g. Polyboot.B, AntiEXE etc. 5. Macro Virus It infects files that are created using certain applications or programs that contain macros, like .doc, .xls, .ppt etc. e.g. Melissa.A 6. File System Virus It is also called Cluster virus or Directory virus. It infects the directory of the computer by changing the path that indicates the location of a file. e.g. Dir-2 virus 7. Polymorphic Virus It encrypts or encodes itself in an encrypted way, every time it infects a system. This virus then goes on to create a large number of copies. e.g. Elkern, Tuareg etc. 8. FAT Virus It is used to store all the information about the location of files, unusable space, etc. e.g. Link virus etc. 9. Multipartite Virus It may spread in multiple ways such as the operating system installed or the existence of certain files. e.g. Flip. 10. Web Scripting Virus Many Websites execute complex code in order to provide interesting content. These sites are sometimes created with purposely infected code. e.g. JS Fortnight
  • 3. Effects of Virus There are many different effects that viruses can have on your computer, depending on the types of virus. Some viruses can (i) monitor what you are doing. (ii) slow down your computer’s performance. (iii) destroy all data on your local disk. (iv) affect on computer networks and the connection to Internet. (v) increase or decrease memory size. (vi) display different types of error messages. (vii) decrease partition size. (viii)alter PC settings. (ix) display arrays of annoying advertising. (x) extend boot times. (xi) create more than one partitions. Worms A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms are hard to detect because they are invisible files. e.g. Bagle, I love you, Morris, Nimda etc. Trojan A Trojan, or Trojan horse, is a non-self-replicating type of malware which appears to perform a desirable function but instead facilitates unauthorized access to the user’s computer system. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive by downloads or install via online games or Internet driven applications in order to reach target computers. Unlike viruses, Trojan horses do not replicate themselves. e.g. Beast, Sub7.Zeus, ZeroAccess Rootkit etc. Spyware It is a program which is installed on a computer system to spy on the system owner’s activity and collects all the information which is misused afterwards. It tracks the user’s behaviour and reports back to a central source. These are used for either legal or illegal purpose. Spyware can transmit personal information to another person’s computer over the Internet. e.g. CoolWeb Search, FinFisher, Zango, Zlob Trojan, Keyloggers etc. Symptoms of Malware Attack There is a list of symptoms of malware attack which indicates that your system is infected with a computer malware. Some primary symptoms of malware attack are as follows (i) Odd messages are displaying on the screen. (ii) Some files are missing. (iii) System runs slower. (iv) PC crashes and restarts again and again. (v) Drives are not accessible. (vi) Antivirus software will not run or installed. (vii) Unexpected sound or music plays. (viii) The mouse pointer changes its graphic.
  • 4. (ix) System receives strange E-mails containing odd attachments or viruses. (x) PC starts performing functions like opening or closing window, running programs on its own. Some Other Threats to Computer Security There are some other threats to computer security which are described below 1. Spoofing It is the technique to access the unauthorized data without concerning to the authorized user. It accesses the resources over the network. It is also known as ‘Masquerade’. IP spoofing is a process or technique to enter in another computer by accessing its IP address. It pretends to be a legitimate user and access to its computer via a network. 2. Salami Technique It diverts small amounts of money from a large number of accounts maintained by the system. 3. Hacking It is the act of intruding into someone else’s computer or network. Hacking may result in a Denial of Service (DoS) attack. It prevents authorized users from accessing the resources of the computer. A hacker is someone, who does hacking process. 4. Cracking It is the act of breaking into computers. It is a popular, growing subject on Internet. Cracking tools are widely distributed on the Internet. They include password crackers, trojans, viruses, wardialers, etc. 5. Phishing It is characterized by attempting to fraudulently acquire sensitive information such as passwords, credit cards details etc. by masquerading as a trustworthy person. 6. Spam It is the abuse of messaging systems to send unsolicited bulk messages in the form of E-mails. It is a subset of electronic spam involving nearly identical messages sent to numerous recipients by E-mails. 7. Adware It is any software package which automatically renders advertisements in order to generate revenue for its author. The term is sometimes used to refer the software that displays unwanted advertisements. 8. Rootkit It is a type of malware that is designed to gain administrative level control over a computer system without being detected. Solutions to Computer Security Threats Some safeguards (or solutions) to protect a computer system from accidental access, are described below Antivirus Software It is an application software that is designed to prevent, search for, detect and remove viruses and other malicious softwares like worms, trojans, adware and more. It consists of computer programs that attempt to identify threats and eliminate computer viruses and other malware. Some popular Antiviruses (i) Avast (ii) Avg (iii) K7 (iv) Kaspersky (v) Trend Micro (vi) Quick Heal (vii) Symantec (viii) Norton (ix) McAfee Digital Certificate It is the attachment to an electronic message used for security purposes. The common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. It provides a means of proving your identity in electronic transactions. Digital Signature It is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged.
  • 5. Firewall It can either be software based or hardware based and is used to help in keeping a network secure. Its primary objective is to control the incoming and outgoing network traffic by analysing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter) network, such as the Internet, that is not assumed to be secure and trusted. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. Password It is a secret word or a string of characters used for user authentication to prove identity or access approval to gain access to a resource. A password is typically somewhere between 4 to 16 characters, depending on how the computer system is setup. When a password is entered, the computer system is careful not to display the characters on the display screen, in case others might see it. There are two common modes of password as follows (i) Weak Password Easily remember just like names, birth dates, phone number etc. (ii) Strong Password Difficult to break and a combination of alphabets and symbols. File Access Permission Most current file systems have methods of assigning permissions or access rights to specific user and group of users. These systems control the ability of the users to view or make changes to the contents of the file system. File access permission refers to privileges that allow a user to read, write or execute a file. There are three specific file access permissions as follows (i) Read Permission If you have read permission of a file, you can only see the contents. In case of directory, access means that the user can read the contents. (ii) Write Permission If you have write permission of a file, you can only modify or remove the contents of a file. In case of directory, you can add or delete contents to the files of the directory. (iii) Execute Permission If you have execute permission of a file, you can only execute a file. In case of directory, you must have execute access to the bin directory in order to execute it or cd command. Terms Related to Security 1. Eavesdropping The attacker monitors transmissions for message content. 2. Masquerading The attacker impersonates an authorised user and thereby gain certain unauthorized privilege. 3. Patches It is a piece of software designed to fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs and improving the usability and performance. 4. Logic Bomb It is a piece of code intentionally inserted into a computer’s memory that will set off a malicious function when specified conditions are met. They are also called slag code and does not replicate itself. 5. Application Gateway This applies security mechanisms to specific applications such as File Transfer Protocol (FTP) and Telnet services. 6. Proxy Server It can act as a firewall by responding to input packets in the manner of an application while blocking other packets. It hides the true network addresses and used to intercept all messages entering and leaving the network. Highlights ■ Keylogger is a software program designed to record every keystroke on the machine on which it runs. ■ The legal right to use software based on specific restrictions is granted via Software license. ■ Payloads is code in the worm designed to do more than spread the worm. Bomb virus has a delayed payload ■ Software Piracy means copying of data or computer software without the owner’s permission.
  • 6. 1. It takes advantages of basic hardware and software security characteristics. (1) System design (2) Data access control (3) System access control (4) None of these Ans. 1 2. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016] (1) Authentication (2) Automation (3) Firewall (4) Encryption (5) None of these Ans. 1 3. Cracked softwares are another source of (1) E-mail attack (2) Virus attack (3) Trojan horse (4) All of these Ans. 2 4. A malware is an (1) program (2) hardware (3) a person (4) None of these Ans. 1 5. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. (1) Keylogger (2) Worm (3) Virus (4) Cracker Ans. 3 6. A computer virus is (1) deliberately created (2) created accidently (3) produced as result of some program error (4) All of the above Ans. 1 7. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and downloading software from the Internet? [SBI PO 2014] (1) Utility (2) Virus (3) Honey Pot (4) Spam (5) App Ans. 2 8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a [RBI Grade B 2012] (1) disease (2) torpedo (3) hurricane (4) virus (5) infector Ans. 4 9. Computer virus is [IBPS Clerk 2011] (1) a hardware (2) windows tool (3) a computer program (4) a system software (5) None of the above Ans. 3 10. Which among the following is related to the internet and mail? (1) Boot-UP (2) Magnetic Tapes (3) Applications Software (4) Paging (5) Virus Ans. 5 11. The first PC virus was developed in (1) 1980 (2) 1984 (3) 1986 (4) 1988 Ans. 3 12. Which virus spreads in application software? (1) Macro virus (2) Boot virus (3) File virus (4) Antivirus Ans. 1
  • 7. 13. Which of the following is the type of software that has self-replicating software that causes damage to files and system? (1) Viruses (2) Trojan horses (3) Bots (4) Worms Ans. 4 14. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system it propagates through computer networks. (1) Keylogger (2) Worm (3) Cracker (4) None of these Ans. 2 15. A worm (1) can automatically move in network (2) can only be transferred with human intervention (3) worms are harmless (4) None of the above Ans. 1 16. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or documents. (1) Self attach (2) Self-replicating (3) Non-self-replicating (4) Hacking Ans. 2 17. A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015] (1) host program (2) target program (3) backdoor program (4) Bluetooth (5) Trojan horse Ans. 5 18. These are program designed as to seem to being or be doing one thing, but actually being or doing another. (1) Trojan horses (2) Keylogger (3) Worm (4) Cracker Ans. 1 19. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called (1) Trojan horses (2) Keylogger (3) Worm (4) Cracker Ans. 1 20. A ......... is a small program embedded inside of a GIF image. (1) Web bug (2) cookie (3) spyware application (4) spam Ans. 3 21. Hackers often gain entry to a network be pretending to be at a legitimate computer (1) spoofing (2) forging (3) IP spoofing (4) All of these Ans. 3 22. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (1) Spoofing attack (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit Ans. 1 23. Attempt to gain unauthorized access to a user’s system or information by pretending to be the user? [IBPS RRB PO 2018] (1) Spoofing (2) Hacker (3) Cracker (4) Phishing (5) None of these Ans. 1
  • 8. 24. Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014] (1) Hacker (2) Spammer (3) Phish (4) Identify theft (5) Cookie Ans. 1 25. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011] (1) Spammer (2) hacker (3) instant messenger (4) All of these (5) None of these Ans. 2 26. Hackers (1) All have the same motive (2) are another name of users (3) Many legally break into computer as long as they do not do any damage (4) Are people who are allergic to computers (5) break into other people’s computer Ans. 5 27. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014] (1) Cyber Terrorist (2) Black-hat-Hacker (3) Cyber Cracker (4) Hacktivist (5) Other than those given as options Ans. 3 28. An act of sending e-mails or creating WebPages that are designed to collect and individual’s online bank, credit card or other login information? (1) Phishing (2) Spam (3) Hacking (4) Cracking Ans. 1 29. ......... are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011, IBPS Clerk 2013] (1) Phishing trips (2) Computer viruses (3) Spyware scams (4) Viruses (5) Phishing scams Ans. 1 30. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010] (1) Spoofing (2) Phishing (3) Stalking (4) Hacking (5) None of these Ans. 2 31. All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014] (1) hackers (2) spam (3) viruses (4) identify theft (5) None of these Ans. 2 32. Junk E-mail is also called [Union Bank of India 2011] (1) spam (2) spoof (3) sniffer script (4) spool (5) None of these Ans. 1 33. ……… is a type of electronic spam where unsolicited messages are sent by e-mail. (1) Trash mail (2) Cram mail (3) Draft mail (4) Spam mail Ans. 4
  • 9. 34. Adware is something (1) which is added to your computers (2) by adding this performance of your computer increases (3) software that gets different advertisement (4) None of the above Ans. 3 35. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (1) Rootkit (2) Keylogger (3) Worm (4) Cracker Ans. 1 36. It is a prepared application that takes advantage of a known weakness. (1) Security exploit (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit Ans. 1 37. It is a tool used to quickly check computers on a network for known weaknesses. (1) Security exploit (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit Ans. 2 38. A ......... is anything that can cause harm. (1) Vulnerability (2) phishing (3) threat (4) spoof Ans. 1 39. An antivirus is a (n) (1) program code (2) computer (3) company name (4) application software (5) None of these Ans. 4 40. Antivirus software is an example of (1) business software (2) an operating system (3) a security (4) an office suite Ans. 3 41. A digital signature is an [SBI Clerk 2011] (1) scanned signature (2) signature in binary form (3) encrypting information (4) handwritten signature (5) None of the above Ans. 3 42. To protect yourself from computer hacker intrusions, you should install a [RBI Grade B 2012] (1) firewall (2) mailer (3) macro (4) script (5) None of these Ans. 1
  • 10. 43. Which one of the following is a key function of firewall? [SBI PO 2010] (1) Monitoring (2) Deleting (3) Copying (4) Moving (5) None of these Ans. 1 44. Mechanism to protect network from outside attack is (1) firewall (2) antivirus (3) digital signature (4) formatting Ans. 1 45. A firewall operated by [SBI Clerk 2010] (1) the pre-purchase phase (2) isolating intranet from extranet (3) screening packets to/from the network and provide controllable filtering of network traffic (4) All of the above (5) None of the above Ans. 3 46. Coded entries which are used to gain access to a computer system are called (1) Entry codes (2) Passwords (3) Security commands (4) Code words Ans. 2 47. Password enables users to (1) get into the system quickly (2) make efficient use of time (3) retain confidentiality of files (4) simplify file structure Ans. 3 48. Which of the following is the combination of numbers, alphabets along with username used to get access to user account? (1) Password (2) Username (3) Titlename (4) Host-Id Ans. 1 49. ……… refers to privileges that allow a user to read, write or execute a file. (1) Authentication (2) File access permission (3) Password (4) Firewall Ans. 2 50. The unauthorized real-time interception of a private communication such as a phone call, instant message known as (1) replay (2) eavesdropping (3) patches (4) payloads (5) None of these Ans. 2
  • 11. 51. Vendor created program modifications are called [Allahabad Bank PO 2011] (1) patches (2) Antivirus (3) hales (4) fixes (5) overlaps Ans. 1 52. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself ? [SBI PO 2011] (1) Trojan horse (2) Logic bomb (3) Cracker (4) Firewall Ans. 2 53. Some viruses have a delayed payload, which is sometimes called a (1) time (2) antivirus (3) bomb (4) All of these Ans. 3 54. Which was the first PC boot sector virus? (1) Creeper (2) Payload (3) Bomb (4) Brain Ans. 4 55. It hides the true network addresses and used to intercept all messages entering and leaving the network. (1) Logic bomb (2) Firewall (3) Patches (4) Proxy server Ans. 4 56. It is a software program designed to record (log) every keystroke on the machine on which it runs. (1) Keylogger (2) Worm (3) Virus (4) Cracker Ans. 1 57. The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012] (1) software privacy policy (2) software license (3) software password manager (4) software log (5) None of the above Ans. 2 58. ……… refers to the unauthorized copying and distribution of software. [IBPS Clerk 2014] OR Illegal copying and distribution of software is [IBPS RRB PO 2018] (1) Hacking (2) Software piracy (3) Software literacy (4) Cracking (5) Copyright Ans. 2 1. ……… is a branch of information technology known as information security. (1) Computer security (2) Cyber security (3) IT security (4) All of these 2. Verification of a login name and password is known as [IBPS Clerk 2014] (1) configuration (2) accessibility (3) authentication (4) logging in (5) Other than those given as options
  • 12. 3. The scrambling of code is known as (1) Encryption (2) Firewalling (3) Scrambling (4) Deception (5) Permuting 4. The main reason to encrypt a file is to (1) reduce its size (2) secure it for transmission (3) prepare it for backup (4) include it in the start-up sequence 5. Software such as Viruses, Worms and Trojan Horses that have a malicious content, is known as [IBPS Clerk 2014] (1) Malicious software (malware) (2) adware (3) Scareware (4) spyware (5) firewall 6. Viruses, trojan horses and worms are [IBPS Clerk 2012] (1) able to harm computer system (2) unable to detect if present on computer (3) user-friendly applications (4) harmless applications resident on computer (5) None of the above 7. …… are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015] (1) Portals (2) Spam (3) Viruses (4) Other than those given as options (5) E-mail messages 8. If your computer rebooting itself then it is likely that [SBI Clerk 2012] (1) it has a virus (2) it does not have enough memory (3) there is no printer (4) there has been a power surge (5) it needs a CD-ROM 9. The first computer virus is (1) creeper (2) PARAM (3) the famous (4) HARLIE 10. The ......... of a threat measures its potential impact on a system. [IBPS Clerk 2011] (1) vulnerabilities (2) counter measures (3) degree of harm (4) susceptibility (5) None of these Click here for Answers Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English] https://bharatskills.in/best-computer-mcq-book-for-competitive-exams/ Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi) https://bharatskills.in/computer-mcq-book-in-hindi-pdf/ HEETSON Telegram https://t.me/Heetson_Official WhatsApp Channel @heetsoniti