Basic Computer Security MCQ
Basic Computer Security MCQ
1. A vulnerability scanner is
- a perpared application that takes advantage of a known weakness.
- a tool used to quickly check computers ohn a network for known weaknesses.
- an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the netwrk.
- A situation in which one person or program successfully masquerades as another by falsfying data and thereby gaining illegitimate access.
2. A packet sniffer is
- a prepared appication that takes advantage of a known weakness.
- a tool used to quickly check computers on a network for known weaknesses.
- an application that captures TCP/IP data packets. which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
- a situation in which one person or program successfully masquerades as another by falsfying data and thereby gaining illegtimate access.
3. These hacker breaks security for altruistic or at least non-malicious reasons.
- White that
- Grey hat
- Blue hat
- None of these
4. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
- white hat
- Grey hat
- Blue hat
- None of these
5. This hacker is someone outside computer secirity consulting firms that are used to bug test a system prior to its launch, looking for expliuts so they can be closed.
- White hat
- Grey hat
- Blue hat
- None of these
6. It is a software program designed to record ('log') every keystroke on the machne on whch it runs
- Keylogger
- Worm
- Virus
- Cracker
7. It is a self-replicating program that infects computer and sperads by inserting copies of itself into other executable code of documents.
- Keybogger
- Worm
- Virus
- Crcker
8. Like a virus, it is also a self-replicating program. the difference between a virus and it is that a worm does not create copies of itself on one system: It propagates through computer networks.
- Keylogger
- Worm
- Cracker
- None of these
9. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
- Trojan horses
- Keylogger
- Worm
- Cracker
10. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
- Trojan horses
- Keylogger
- Worm
- Cracker