Results
#1. ......... is a branch of information technology known as information security.
All of these options are correct. Computer security, cyber security, and IT security are all branches of information technology focused on protecting computer systems, networks, and data from unauthorized access, attacks, and threats. These terms are often used interchangeably, although there may be slight differences in their scope and emphasis depending on the context.
#2. It takes advantages of basic hardware and software security characteristics.
The correct answer is “System design.” System design involves designing and implementing hardware and software components with built-in security features and considerations. These security characteristics can include hardware features like encryption modules, secure boot mechanisms, and trusted platform modules (TPMs), as well as software features like access control, authentication protocols, and secure coding practices. System design plays a crucial role in ensuring the overall security and integrity of an information system.Data access control and system access control, on the other hand, refer to specific security measures and mechanisms rather than the broader concept of leveraging hardware and software security characteristics.
#3. Verification of a login name and password is known as
The verification of a login name and password is known as authentication. Authentication is the process of confirming the identity of a user or entity attempting to access a system or resource. It involves verifying the login credentials provided, such as a username and password, to ensure that the user is who they claim to be. Authentication is a fundamental component of access control and helps ensure the security of systems and data by allowing only authorized individuals to access protected resources.
#4. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of
The act of allowing a person on the network based on credentials to maintain the security of your network refers to the process of authentication. Authentication involves verifying the identity of a user or entity attempting to access a network or system. By checking the provided credentials, such as a username and password, authentication helps ensure that only authorized individuals are granted access to the network, thereby maintaining the security of the network. Therefore, in this context, the correct answer is authentication.
#5. The scrambling of code is known as
The scrambling of code is known as encryption. Encryption is the process of transforming information or data into a secure and unreadable format, often referred to as ciphertext, using an encryption algorithm and a key. The purpose of encryption is to protect the confidentiality and integrity of the data by ensuring that only authorized parties with the correct decryption key can access and understand the original information. Encryption is widely used in various areas, such as secure communication, data storage, and online transactions, to safeguard sensitive information from unauthorized access or interception. Therefore, the correct answer is encryption.
#6. The main reason to encrypt a file is to
The main reason to encrypt a file is to secure it for transmission. Encryption is commonly used to protect the confidentiality and integrity of data during transmission over networks or when stored in vulnerable locations. By encrypting a file, it is transformed into an unreadable format, ensuring that even if it is intercepted or accessed by unauthorized individuals, they would not be able to understand or misuse the information. Encryption provides a means of safeguarding sensitive data and preventing unauthorized access or tampering. Therefore, the primary purpose of file encryption is to secure it for transmission.
#7. Cracked softwares are another source of
Cracked software refers to unauthorized copies of software that have been modified to remove or bypass copy protection measures. These cracked software versions are often obtained from unofficial sources and are distributed without the permission of the software developers or vendors.
While the use of cracked software itself may not directly result in e-mail attacks, virus attacks, or Trojan horses, it does pose significant risks.
- E-mail attacks: Cracked software can be bundled with malicious components, such as email spamming tools or phishing applications, which may be used to launch e-mail attacks. These attacks could involve sending spam emails, phishing attempts, or spreading malware through infected attachments.
- Virus attacks: Cracked software can be a common carrier for viruses and malware. When individuals download and install cracked software from untrusted sources, they may inadvertently introduce viruses or malware onto their systems. These malicious programs can then cause various types of attacks, such as stealing personal information, corrupting files, or taking control of the infected system.
- Trojan horse: Cracked software can also be a delivery mechanism for Trojan horses. Trojans are malicious programs that appear legitimate or useful but contain hidden harmful functionality. When users install cracked software, they may unknowingly install a Trojan horse along with it, allowing attackers to gain unauthorized access to their systems, steal information, or carry out other malicious activities.
Therefore, the use of cracked software can potentially expose users to e-mail attacks, virus attacks, and Trojan horses, making it a source of multiple security risks.
#8. A malware is an
A malware is a type of program. The term “malware” is a combination of the words “malicious” and “software.” It refers to any software or program that is designed to cause harm, exploit vulnerabilities, or disrupt the normal functioning of computer systems, networks, or devices. Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, adware, and more. These malicious programs are typically created and deployed by individuals or groups with malicious intent. Malware can damage files, steal sensitive information, compromise system security, and perform other harmful actions. Therefore, a malware is a type of program that poses a threat to computer systems and networks.
#9. Softwares such as Viruses, Worms and Trojan Horses that have a malicious content, is known as
The correct answer is: Malicious software (malware).
Malicious software, commonly referred to as malware, is a term used to describe software programs designed to infiltrate, damage, or gain unauthorized access to computer systems or networks. Viruses, worms, and Trojan horses are all examples of malware.
- Viruses: These are programs that replicate and spread by attaching themselves to other files or programs. They can cause various types of damage, such as corrupting files or disrupting system operations.
- Worms: Worms are self-replicating programs that can spread across computer networks, often exploiting security vulnerabilities. They can consume network bandwidth, slow down systems, and even carry payloads that cause harm.
- Trojan horses: Trojan horses are deceptive programs that appear to be legitimate but actually contain malicious code. They can be used to gain unauthorized access to a system, steal sensitive information, or perform other malicious activities.
Adware, scareware, spyware, and firewall are all related terms but have different meanings:
- Adware: Adware is software that displays advertisements on a user’s computer, often in a way that is unwanted or intrusive. While it can be annoying, it is typically not considered as malicious as viruses, worms, or Trojan horses.
- Scareware: Scareware is a type of software that tricks users into believing their computer is infected with malware or other security threats. It then attempts to convince them to purchase fake or unnecessary software to resolve the fabricated issues.
- Spyware: Spyware is software that secretly monitors a user’s activities, often without their knowledge or consent. It can track keystrokes, capture personal information, and transmit it to third parties without the user’s consent.
- Firewall: A firewall is a security device or software that monitors and filters network traffic, allowing or blocking specific connections based on predetermined security rules. It acts as a barrier between a trusted internal network and external networks, providing protection against unauthorized access and network attacks.
In the context of the question, viruses, worms, and Trojan horses fall under the category of malicious software (malware).
#10. Viruses, trojan horses and worms are
The correct answer is: able to harm computer systems.
Viruses, trojan horses, and worms are types of malicious software (malware) that are specifically designed to cause harm to computer systems. They can carry out various destructive actions, such as corrupting files, stealing sensitive information, disrupting system operations, and spreading to other computers or networks. These types of malware pose a significant threat to the security and functionality of computer systems and are certainly able to harm them.
#11. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
The correct answer is: Virus.
A virus is a self-replicating program that infects computer systems by inserting copies of itself into other executable code or documents. Once the infected code or document is executed, the virus activates and starts to replicate and spread to other files, often without the user’s knowledge or consent.
Viruses are capable of causing various types of damage to computer systems, such as corrupting files, deleting data, disrupting system operations, and even rendering the system inoperable. They can also be designed to perform other malicious activities, such as stealing sensitive information or providing unauthorized access to the system.
Keyloggers, worms, and crackers are related terms but have different meanings:
- Keylogger: A keylogger is a type of malicious software or hardware that records keystrokes made on a computer or device. It can be used to capture sensitive information, such as passwords, credit card numbers, or other personal data, without the user’s knowledge.
- Worm: As mentioned in the previous question, a worm is a self-replicating program that can spread across computer networks. Unlike viruses, worms do not need to attach themselves to other files or documents. They typically exploit security vulnerabilities to spread and can cause significant network congestion and system slowdown.
- Cracker: In the context of computer security, a cracker refers to an individual who attempts to gain unauthorized access to computer systems or networks with malicious intent. Crackers often use various techniques, such as exploiting vulnerabilities, bypassing security measures, or cracking passwords, to gain unauthorized access.
#12. A computer virus is
The correct answer is: deliberately created.
A computer virus is deliberately created. It is a type of malicious software (malware) that is intentionally developed by individuals or groups with the purpose of infecting computer systems and causing harm. Virus creators write the code and design the virus to perform specific actions, such as replicating itself, infecting files, and spreading to other computers or networks.
Computer viruses are not created accidentally or as a result of program errors. They are the result of intentional programming and often involve sophisticated techniques to exploit vulnerabilities in computer systems or deceive users into executing infected files.
Therefore, the correct answer is that a computer virus is deliberately created.
#13. ...... are often delivered to a PC through an mail attachment and are often designed to do harm.
Computer virus are often delivered to a PC through an email attachment and are often designed to do harm. A computer virus is a malicious program that normally self-replicates by copying itself to another computer program.
#14. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and downloading software from the Internet?
The correct answer is: Virus.
Viruses are dangerous programs that can be “caught” by opening email attachments or downloading software from the internet. Viruses are a type of malicious software (malware) that are designed to replicate and spread by infecting other files or programs. They often disguise themselves as legitimate files or attachments, tricking users into executing or opening them. Once activated, viruses can carry out various harmful actions, such as corrupting files, deleting data, or spreading to other systems.
Utilities refer to software programs that provide specific functionality or perform certain tasks, such as system optimization, data backup, or security scanning. They are not necessarily dangerous programs.
Honey Pot is a term used to describe a security mechanism or system that is intentionally designed to attract and monitor unauthorized access attempts. It is not directly related to the act of catching dangerous programs.
Spam refers to unsolicited bulk messages sent through email, which may or may not contain malicious content. While spam emails can sometimes carry harmful attachments or links, the term itself does not specifically refer to dangerous programs.
An app is a term typically used to describe applications or software programs designed for mobile devices or computers. Not all apps are dangerous, but some malicious apps may exist that can harm the device or compromise user data. However, the term “virus” is more commonly used to describe dangerous programs transmitted through email attachments or internet downloads.
#15. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a
The correct answer is: Virus.
A virus is a program designed to destroy data on a computer and can also travel to infect other computers. Viruses are a type of malicious software (malware) that can replicate and spread by attaching themselves to other files or programs. They are often designed with destructive intent and can cause significant damage to computer systems by corrupting or deleting files, disrupting system operations, and even rendering the system inoperable.
While terms like “disease,” “torpedo,” “hurricane,” and “infector” may be used metaphorically to describe the destructive nature of viruses, the commonly accepted and recognized term for such programs is “virus.” It is important to note that these terms are not specific technical terms used in the field of computer security.
#16. If your computer rebooting itself then it is likely that
The correct answer is: It could be due to various reasons, and additional information is needed to determine the exact cause.
Random and unexpected computer reboots can be caused by various factors, and it is not possible to pinpoint a specific reason without more information. Some possible causes could include:
- Virus or malware infection: While a virus or malware infection can cause unexpected behaviors on a computer, such as sudden reboots, it is not the only possible explanation.
- Insufficient memory: If a computer does not have enough memory (RAM), it can struggle to handle the demands of running various programs, which may result in unexpected reboots. However, this is not the only factor that can cause reboots.
- Printer-related issues: The presence or absence of a printer is generally not directly linked to random reboots.
- Power surge: A power surge can cause a sudden loss of power, resulting in the computer rebooting. However, this would typically affect other devices connected to the same power source as well.
- CD-ROM requirement: Unless a specific program or operating system installation requires a CD-ROM, the need for a CD-ROM is unlikely to be the cause of random reboots.
To determine the exact cause of a computer rebooting itself, it is recommended to investigate further, check system logs for error messages, run antivirus scans, monitor hardware temperature, and consider any recent software or hardware changes that may have been made. Consulting with a computer technician or IT professional may also be helpful in diagnosing and resolving the issue.
#17. Computer virus is
The correct answer is: a computer program.
A computer virus is a type of computer program. It is a malicious software (malware) that is designed to replicate and spread by infecting other files or programs. Viruses are typically created by individuals or groups with the intention of causing harm to computer systems.
Computer viruses can carry out various destructive actions, such as corrupting files, deleting data, disrupting system operations, or stealing sensitive information. They are programmed to exploit vulnerabilities in computer systems and can spread from one computer to another, often through shared files, email attachments, or internet downloads.
Therefore, a computer virus is not a hardware component, Windows tool, system software, or any other physical entity. It is a type of computer program that can cause damage to computer systems.
#18. Which among the following is related to the internet and mail?
The correct answer is: Virus.
Among the options provided, a virus is the one that is related to the internet and mail. Viruses can be spread through various means, including email attachments and internet downloads. When a user opens an infected email attachment or downloads a file from the internet that contains a virus, their computer can become infected. From there, the virus can spread to other computers, either through email or by exploiting vulnerabilities in network connections.
Boot-UP refers to the process of starting or rebooting a computer.
Magnetic Tapes are a form of storage media used in the past, but they are not directly related to the internet and mail.
Applications Software refers to software programs designed to perform specific tasks or provide specific functionality on a computer, such as word processing, spreadsheet management, or email clients. While email clients can be related to mail, this option is not as directly related to the internet and mail as a virus.
Paging typically refers to a memory management technique used by computer operating systems and is not specifically related to the internet and mail.
In summary, among the options provided, a virus is the one that is directly related to the internet and mail.
#19. The first PC virus was developed in
The correct answer is: 1986.
The first PC virus, known as the Brain virus, was developed in 1986. It was created by two Pakistani brothers, Basit Farooq Alvi and Amjad Farooq Alvi, who were running a computer store in Lahore, Pakistan. The Brain virus was designed to infect floppy disks and spread when the infected disk was used on another computer.
The Brain virus was relatively harmless compared to later viruses, as its main purpose was to prevent unauthorized copying of software. However, it marked the beginning of a new era in computer security and raised awareness about the potential risks of computer viruses.
While viruses and other forms of malware existed prior to the development of the Brain virus, it is considered the first significant PC virus that garnered attention and highlighted the need for antivirus measures.
#20. The first computer virus is
The first computer virus is commonly recognized as “Creeper.”
Developed in the early 1970s by Bob Thomas, Creeper was an experimental self-replicating program that targeted the TENEX operating system on the ARPANET (a precursor to the internet). Creeper displayed a message on infected systems, stating, “I’m the creeper, catch me if you can!” It moved between computers using the ARPANET and demonstrated the ability to self-replicate.
Although Creeper is considered the first self-replicating program, it is worth noting that the term “virus” had not yet been coined. The term “virus” to refer to self-replicating programs emerged later.
PARAM and HARLIE are not recognized as the first computer viruses. PARAM is a supercomputer developed in India, while HARLIE is a fictional artificial intelligence character from a science fiction novel.
#21. Which virus spreads in application software?
The correct answer is: Macro virus.
A macro virus is a type of computer virus that spreads in application software, particularly through the use of macros. Macros are small programs or scripts that are embedded within documents or applications and are designed to automate tasks or provide additional functionality. Macro viruses typically infect documents or templates, such as those created in Microsoft Office applications (Word, Excel, PowerPoint).
When an infected document or template containing a macro virus is opened, the virus can execute and spread to other documents or applications on the system. Macro viruses can replicate themselves by attaching to other documents or by creating new documents with the virus code.
Boot viruses, on the other hand, infect the boot sector of a storage device (such as a hard drive or floppy disk) and typically spread when the infected device is accessed during the boot process.
File viruses infect executable files and can spread when these infected files are executed or shared.
Antivirus software, as the name suggests, is not a virus but rather a type of software designed to detect, prevent, and remove viruses and other types of malware from computer systems.
#22. The ......... of a threat measures its potential impact on a system.
The correct answer is: degree of harm.
The degree of harm of a threat refers to the potential impact it can have on a system. It measures the extent of damage or disruption that can be caused if the threat successfully exploits vulnerabilities or weaknesses in the system’s defenses.
Vulnerabilities are weaknesses or flaws in a system that can be exploited by threats to gain unauthorized access, disrupt operations, or cause harm. Countermeasures, on the other hand, are preventive or defensive measures implemented to mitigate or counteract threats and their potential harm. Susceptibility refers to the system’s vulnerability or likelihood of being affected by a threat.
While vulnerabilities, countermeasures, and susceptibility are all factors related to assessing and managing threats, none of them directly measures the potential impact or harm caused by a threat. The degree of harm is a specific measure of the potential damage or disruption a threat can inflict on a system.
#23. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
The correct answer is: Worms.
Worms are a type of software that can self-replicate and spread across computer networks, causing damage to files and systems. Unlike viruses, worms do not need to attach themselves to other files or programs to propagate. They can independently replicate and spread by exploiting vulnerabilities in network protocols or by using various methods such as email, instant messaging, or file-sharing systems.
Worms can cause significant harm by consuming system resources, disrupting network operations, spreading rapidly, and potentially compromising sensitive information. They can delete or corrupt files, install backdoors for remote access, and carry out other destructive actions. Worms often aim to infect as many systems as possible and can create significant disruptions in both personal and networked environments.
Viruses, Trojan horses, and bots are also types of malicious software, but they differ from worms in their behavior and propagation methods. Viruses require a host file to attach themselves to, Trojan horses disguise themselves as legitimate programs, and bots are software programs that can perform automated tasks, often including malicious activities.
#24. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system it propagates through computer networks.
The correct answer is: Worm.
Like a virus, a worm is a self-replicating program. However, the main difference between a virus and a worm is that a worm does not create copies of itself on one system but instead propagates through computer networks to infect other systems.
Worms are designed to independently spread and replicate by exploiting vulnerabilities in network protocols or by using various methods such as email, instant messaging, or file-sharing systems. Once a system is infected, the worm can scan the network for other vulnerable systems and infect them, leading to rapid spreading and potential widespread damage.
On the other hand, a keylogger is a type of software or hardware device that records keystrokes on a computer, often used to capture sensitive information such as passwords or credit card numbers. It does not have the self-replicating capability of a virus or worm.
A cracker, also known as a hacker, refers to an individual who attempts to gain unauthorized access to computer systems or networks with malicious intent. Cracking involves bypassing security measures to exploit vulnerabilities and gain unauthorized access to systems. While crackers may utilize viruses or worms in their activities, they are not synonymous with these types of malicious software.
Therefore, the correct answer is Worm.
#25. A worm
The correct answer is: A worm can automatically move in a network.
Worms are self-replicating programs that can propagate through computer networks automatically without requiring human intervention. Once a system is infected with a worm, it can independently search for other vulnerable systems within the network and attempt to infect them. Worms typically exploit vulnerabilities in network protocols or use other methods, such as email or file-sharing systems, to spread to other systems.
Unlike viruses, which often require human interaction to spread (such as opening an infected email attachment or executing an infected file), worms have the capability to move and spread automatically without human intervention. This ability to self-replicate and spread autonomously is one of the distinguishing characteristics of worms.
It is important to note that worms can cause significant harm to computer systems and networks. They can consume system resources, disrupt network operations, compromise sensitive information, and carry out other destructive actions. Therefore, worms are not harmless, contrary to the third option.
#26. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or documents.
The correct answer is: Self-replicating.
A worm is a self-replicating program that infects computers and spreads by inserting copies of itself into other executable code or documents. Unlike viruses, which typically require a host file to attach themselves to, worms are capable of independently replicating and spreading without the need for a host file.
When a system becomes infected with a worm, the worm can scan the network or other connected systems for vulnerabilities and attempt to exploit them to gain unauthorized access. It can then copy itself and infect other systems by inserting its code into executable files or documents, often utilizing various methods such as email, instant messaging, or network connections.
The self-replicating nature of worms allows them to rapidly spread across computer networks, potentially causing widespread damage and disruption. It is important to have proper security measures in place to protect against worm infections and to keep systems and software up to date with patches to mitigate vulnerabilities.
#27. A computer virus normally attaches itself to another computer program known as a
#28. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
The correct answer is: Trojan horses.
Trojan horses are programs designed to deceive users by appearing to be or do one thing but actually performing a different, often malicious, action. They are named after the Trojan Horse from Greek mythology, which was a large wooden horse that appeared to be a gift but concealed Greek soldiers inside.
Similarly, in the context of computer security, Trojan horses appear to be legitimate or useful programs, enticing users to download or execute them. However, once activated, they carry out hidden actions that can include unauthorized access, data theft, system compromise, or the installation of other malware.
Keyloggers are a type of software or hardware that records keystrokes on a computer, often used for capturing sensitive information such as passwords or credit card numbers. They do not necessarily involve deceptive behavior like Trojan horses.
Worms, as previously explained, are self-replicating programs that can automatically spread through computer networks.
A cracker, also known as a hacker, is an individual who attempts to gain unauthorized access to computer systems or networks. While crackers may utilize Trojan horses or other methods in their activities, the term “cracker” does not specifically refer to programs designed to deceive users.
Therefore, the correct answer is Trojan horses.
#29. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called
The correct answer is: Trojan horses.
Viruses that deceive users by pretending to be useful applications are often referred to as Trojan horses. Trojan horses are a specific type of malware that masquerades as legitimate software or files to trick users into downloading, installing, or executing them. These malicious programs disguise themselves as harmless or desirable applications, enticing users to interact with them.
Once a Trojan horse is executed, it can perform various malicious actions, such as granting unauthorized access to the system, stealing sensitive information, or compromising system security. The deceptive nature of Trojan horses is what distinguishes them from other types of malware.
Keyloggers, as mentioned earlier, are software or hardware designed to record keystrokes on a computer to capture sensitive information.
Worms are self-replicating programs that can automatically spread through computer networks.
A cracker refers to an individual who attempts to gain unauthorized access to computer systems or networks. While crackers may use various methods, including Trojan horses, the term “cracker” does not specifically refer to programs that deceive users.
Therefore, the correct answer is Trojan horses.
#30. A ......... is a small program embedded inside of a GIF image.
#31. Hackers often gain entry to a network be pretending to be at a legitimate computer
#32. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
The correct answer is: Spoofing attack.
A spoofing attack refers to a situation in which one person or program successfully masquerades as another by falsifying data, leading to gaining illegitimate access. In a spoofing attack, the attacker manipulates or forges information to deceive a system or user into believing that they are interacting with a legitimate entity.
There are different types of spoofing attacks, including:
- IP Spoofing: The attacker falsifies the source IP address of network packets to make it appear as if they are originating from a trusted source, allowing them to bypass authentication or gain unauthorized access.
- Email Spoofing: The attacker manipulates the email header information to make it seem as though the email is coming from a different sender, potentially tricking the recipient into disclosing sensitive information or executing malicious actions.
- DNS Spoofing: The attacker redirects or forges DNS (Domain Name System) responses to redirect users to fraudulent websites or intercept their network traffic.
- Caller ID Spoofing: The attacker manipulates the caller ID information to make it appear as if the call is originating from a different phone number, potentially deceiving the recipient into providing sensitive information or engaging in fraudulent activities.
Vulnerability scanners and packet sniffers are not directly related to the act of masquerading or falsifying data to gain illegitimate access.
A rootkit is a type of malicious software that is designed to gain privileged access and control over a system while hiding its presence from detection.
Therefore, the correct answer is Spoofing attack.
#33. Attempt to gain unauthorised access to a user’s system or information by pretending to be the user?
The correct term for attempting to gain unauthorized access to a user’s system or information by pretending to be the user is “spoofing.” Spoofing involves impersonating a user or a trusted entity to deceive others and gain unauthorized access or extract sensitive information.
While the terms “hacker” and “cracker” are often used interchangeably, they generally refer to individuals with advanced technical skills who may engage in various activities related to computer security. However, not all hackers or crackers engage in spoofing specifically.
Phishing, on the other hand, is a specific type of cyber attack that involves sending fraudulent emails or messages to deceive individuals into revealing sensitive information, such as passwords or credit card details. While phishing can involve impersonation, it is a broader term that encompasses various methods of social engineering and manipulation.
Therefore, the correct answer to your question is “spoofing.”
#34. Which of the following enables to determine how often a user visited a Website?
#35. A person who uses his expertise for software?
#36. Hackers
Hackers:
- Do not all have the same motive. Hackers can have different motives and intentions, ranging from ethical hacking to malicious activities.
- Are not another name for users. Users refer to individuals who utilize computer systems or software, while hackers specifically refer to individuals with expertise in computer systems and security.
- It is generally illegal to break into computers without authorization, regardless of whether damage is done or not. While there are certain cases where hacking activities may be legal with proper permission and for legitimate purposes, unauthorized access to computer systems is typically considered a criminal offense.
- Being allergic to computers has nothing to do with being a hacker. Hacking is related to computer expertise and knowledge, and individuals who are allergic to computers would not be specifically categorized as hackers.
- Some hackers engage in unauthorized activities where they break into other people’s computers without permission. However, it’s important to note that such activities are generally illegal and can be considered cybercrimes.
To summarize, hackers can have various motives, they are not synonymous with users, unauthorized computer access is generally illegal, being allergic to computers is unrelated to being a hacker, and some hackers do break into other people’s computers without permission.
#37. What is a person called who uses a computer to cause harm to people or destroy critical systems?
A person who uses a computer to cause harm to people or destroy critical systems is commonly referred to as a “malicious hacker” or simply a “hacker.” However, it’s important to note that not all hackers engage in harmful activities. There are different types of hackers, and their intentions and actions can vary significantly. Some hackers use their skills for positive purposes, such as ethical hackers (also known as white-hat hackers) who help identify and fix vulnerabilities in computer systems.
#38. An act of sending e-mails or creating webpages that are designed to collect and individual’s online bank, credit card or other login information?
The act of sending emails or creating webpages that are designed to collect an individual’s online bank, credit card, or other login information is commonly referred to as “phishing.” Phishing is a form of cyber attack where attackers masquerade as a trustworthy entity to deceive individuals into revealing their sensitive information, such as usernames, passwords, or financial details. The goal of phishing is to steal personal or financial information for malicious purposes, such as identity theft or unauthorized access to accounts.
#39. ......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
#40. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication?
The correct answer is “Phishing.” Phishing is a criminal activity where individuals attempt to acquire sensitive information such as passwords, credit cards, or debit card details by masquerading as a trustworthy person or business in electronic communications. Phishing attacks often involve deceptive emails, fake websites, or other forms of communication to trick individuals into revealing their confidential information. It is a prevalent form of cybercrime that targets unsuspecting individuals for the purpose of identity theft, financial fraud, or unauthorized access to accounts.
#41. All of the following are examples of real-security and privacy risks except
#42. Junk E-mail is also called
The correct answer is “spam.” Junk e-mail is commonly referred to as spam. Spam refers to unsolicited and often unwanted email messages that are sent in bulk to a large number of recipients. These emails are typically sent for commercial purposes, advertising products or services, or promoting scams. Spam emails can be a nuisance and pose potential security risks, as they may contain malicious links or attachments.
#43. 43. ......... is a type of electronic spam where unsolicited messages are sent by e-mail.
The correct term is “Spam mail.” Spam mail refers to the unsolicited messages that are sent via email. These messages are typically sent in bulk to a large number of recipients without their consent. Spam mail often contains promotional content, advertisements, or attempts to trick recipients into revealing personal information or engaging in fraudulent activities. It is important to be cautious with spam mail and to avoid clicking on suspicious links or providing personal information in response to such emails.
#44. Adware is something
The correct answer is: “Software that displays different advertisements.”
Adware refers to software that is designed to display advertisements on a user’s computer or device. It is typically installed alongside other software without the user’s explicit consent or knowledge. Adware may display ads in various forms, such as pop-up windows, banners, or in-text ads within web browsers or other applications. Its primary purpose is to generate revenue for the developer or distributor of the adware by delivering targeted advertisements to users. Adware can be considered unwanted or intrusive, as it can disrupt the user experience and potentially track user behavior for advertising purposes.
#45. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
The correct answer is “Rootkit.”
A rootkit is a toolkit or set of software programs that are designed to hide the fact that a computer’s security has been compromised. It works by subverting control of an operating system from its legitimate operators, meaning it allows unauthorized users to gain privileged access and control over a system. Rootkits are often used by malicious actors to conceal their presence and activities on a compromised system, making it difficult for legitimate users or security tools to detect their unauthorized access. Rootkits can modify system files, processes, and configurations, making it challenging to remove them and restore the system to a secure state.
#46. It is a prepared application that takes advantage of a known weakness.
The correct answer is “Security exploit.”
A security exploit is a prepared application or technique that takes advantage of a known weakness or vulnerability in a system, software, or network. Exploits are typically developed to bypass security measures, gain unauthorized access, or perform malicious actions on a target system. They can target specific vulnerabilities in software, operating systems, or network protocols, allowing an attacker to execute arbitrary code, escalate privileges, or carry out other unauthorized activities. Exploits can be used by both malicious hackers and security researchers to test and demonstrate vulnerabilities, but their use in unauthorized or malicious activities is a serious security concern.
#47. It is a tool used to quickly check computers on a network for known weaknesses.
The correct answer is “Vulnerability scanner.”
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses or vulnerabilities. It is designed to identify security flaws in systems, applications, or network infrastructure. Vulnerability scanners scan for known vulnerabilities by comparing the system’s configuration or installed software against a database of known security issues. They can detect weaknesses such as outdated software versions, missing security patches, or misconfigurations that could be exploited by attackers. Vulnerability scanners provide valuable information to system administrators or security professionals, enabling them to identify and address potential vulnerabilities before they are exploited by malicious actors.
#48. A ......... is anything that can cause harm.
#49. An antivirus is a (n)
The correct answer is “application software.”
An antivirus is a type of application software that is designed to detect, prevent, and remove malicious software (malware) from a computer system. Antivirus software scans files, programs, and the overall system for known patterns or signatures of malware. It aims to identify and eliminate viruses, worms, Trojans, ransomware, and other forms of malware that can compromise the security and functionality of a computer. Antivirus software often includes features such as real-time scanning, quarantine or isolation of infected files, automatic updates of virus definitions, and system optimization tools. It plays a vital role in protecting computer systems and data from various security threats.
#50. Antivirus software is an example of
The correct answer is “a security software.”
Antivirus software is an example of security software. It is specifically designed to provide protection against various security threats, particularly malware. Antivirus software helps in detecting, preventing, and removing malicious software such as viruses, worms, Trojans, ransomware, and other forms of malware that can compromise the security and integrity of a computer system. Its primary purpose is to safeguard the system and its data from potential threats and intrusions. While antivirus software can be used by businesses and individuals alike, it falls under the category of security software due to its focus on protecting systems from security risks.
#51. A digital signature is an
A digital signature is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents. A signature confirms that the information originated from the signer and has not been altered.
#52. To protect yourself from computer hacker intrusions, you should install a
The correct answer is “firewall.”
To protect yourself from computer hacker intrusions, installing a firewall is an important step. A firewall is a network security device or software application that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between your computer or network and potential threats from the internet or other external networks.
A firewall can help prevent unauthorized access to your computer or network by analyzing network packets and blocking potentially malicious traffic. It can also provide protection against common hacking techniques such as port scanning, network attacks, and intrusion attempts. Firewalls can be implemented at the network level (hardware firewall) or as software installed on individual computers (software firewall).
By setting up and configuring a firewall properly, you can enhance the security of your computer or network and reduce the risk of hacker intrusions.
#53. Which one of the following is a key function of firewall?
The correct answer is “Monitoring.”
One of the key functions of a firewall is to monitor network traffic. Firewalls analyze incoming and outgoing network packets, examining their source, destination, and other characteristics to determine whether to allow or block them based on predefined security rules. By monitoring network traffic, firewalls can detect potential threats, unauthorized access attempts, or suspicious activities.
In addition to monitoring, firewalls also perform other important functions such as filtering, blocking, and controlling network traffic based on various criteria, such as IP addresses, port numbers, protocols, or application-specific rules. Firewalls can also provide logging and reporting capabilities, allowing administrators to track and analyze network activity for security purposes.
Deleting, copying, or moving data are not typical functions of a firewall. Firewalls primarily focus on regulating and securing network traffic rather than manipulating or managing data itself.
#54. Mechanism to protect network from outside attack is
The correct answer is “firewall.”
A firewall is a mechanism used to protect a network from outside attacks. It acts as a barrier between a private internal network and the external network (usually the internet) by monitoring and controlling incoming and outgoing network traffic.
Firewalls are designed to enforce security policies and rules to determine which network packets are allowed to pass through and which ones should be blocked. By examining network packets based on various criteria such as source and destination IP addresses, port numbers, protocols, and application-specific rules, firewalls can prevent unauthorized access, filter out potentially malicious traffic, and detect and block intrusion attempts.
Firewalls are a fundamental component of network security and play a crucial role in safeguarding networks and systems from external threats. They provide a vital layer of defense by controlling and securing the flow of network traffic to protect against unauthorized access and potential attacks.
#55. A firewall operated by
#56. Coded entries which are used to gain access to a computer system are called
The correct answer is “Passwords.”
Passwords are coded entries or character combinations used to gain access to a computer system. They act as a form of authentication, allowing users to prove their identity and access authorized resources. Passwords are typically kept secret and known only to the individual user to ensure that unauthorized users cannot gain entry into the system. They serve as a security measure to protect sensitive information and maintain the integrity of computer systems and accounts. Users are encouraged to choose strong and unique passwords to enhance security and reduce the risk of unauthorized access.
#57. Password enables users to
A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are typically used in tandem with a username; they are designed to be known only to the user and allow that user to gain access to a device, application or website.
#58. Which of the following is the combination of numbers, alphabets along with username used to get access to user account?
The correct answer is “Password.”
A password is a combination of numbers, alphabets, or other characters that is used in combination with a username to gain access to a user account. It serves as a form of authentication to verify the identity of the user attempting to access the account. The username typically identifies the user, while the password is kept secret and known only to the user. By providing the correct password along with the associated username, the user can authenticate themselves and gain access to their account. Passwords are an essential security measure to protect user accounts and ensure that only authorized individuals can access them.
#59. ......... refers to privileges that allow a user to read, write or execute a file.
The correct answer is “File access permission.”
File access permission refers to privileges that allow a user to read, write, or execute a file. These permissions determine the level of access and control that a user has over a specific file or directory. File access permissions are typically set by the file system or operating system and can be granted or restricted based on user accounts or user groups.
The three common types of file access permissions are:
- Read: This permission allows a user to view the contents of a file without modifying it.
- Write: This permission allows a user to modify or make changes to a file.
- Execute: This permission allows a user to run or execute a file if it contains executable code, such as a program or script.
File access permissions play a crucial role in ensuring the security and integrity of files and data by controlling who can access, modify, or execute them.
#60. The unauthorised real-time interception of a private communication such as a phone call, instant message known as
#61. Vendor created program modifications are called
The correct answer is “patches.”
Vendor-created program modifications are commonly referred to as patches. A patch is a piece of software designed to update, fix, or enhance an existing program or system. It is typically released by the software vendor or developer to address specific issues, vulnerabilities, or bugs identified in the software.
Patches are used to improve the functionality, performance, stability, and security of software applications. They can fix software glitches, address security vulnerabilities, or add new features and enhancements. Patches are usually provided as downloadable files or updates that users can apply to their existing software installations.
By applying patches, users can ensure that their software is up to date and protected against known issues or vulnerabilities. Regularly installing patches is an essential practice to maintain the integrity and security of software applications and systems.
#62. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself ?
The correct answer is “Logic bomb.”
A logic bomb is a type of malicious code that is designed to execute a certain action or cause damage when specific conditions are met. It is typically hidden within a legitimate program and remains dormant until triggered by a predetermined event or time-based trigger. Once activated, the logic bomb can perform various actions, such as deleting files, corrupting data, or disrupting system functionality.
Unlike a virus, a logic bomb does not replicate itself to spread to other systems or files. It remains within the targeted system or program until the trigger condition is met, at which point it executes its malicious payload.
A Trojan horse, on the other hand, is a type of malicious software that disguises itself as a legitimate program or file. It tricks users into installing or executing it, thereby granting unauthorized access or causing harm to the system.
A cracker refers to an individual who engages in unauthorized activities such as hacking, breaching security systems, or breaking software protections.
A firewall is a network security device or software that monitors and controls network traffic to protect against unauthorized access and potential threats.
Therefore, the correct answer is “Logic bomb.”
#63. Some viruses have a delayed payload, which is sometimes called a
The correct answer is “bomb.”
Some viruses have a delayed payload, which is sometimes referred to as a “bomb.” A delayed payload is a malicious action or behavior of a virus that is triggered after a certain period of time or when specific conditions are met.
This delayed action is often designed to evade detection or to maximize the impact of the virus. It allows the virus to remain dormant or undetected for an extended period, making it harder to identify and remove.
Once the trigger conditions are met, the virus activates its payload, which can involve various malicious activities such as data deletion, system corruption, unauthorized access, or spreading to other systems.
While “time” and “antivirus” are also mentioned in the options, they do not specifically refer to the delayed payload of a virus. “Time” can be a factor in determining when a virus activates its payload, but it is not the term commonly used to describe the delayed payload itself. “Antivirus” refers to software designed to detect and remove viruses, but it does not specifically relate to the delayed payload concept.
Therefore, the correct answer is “bomb” as it is commonly used to describe the delayed payload of some viruses.
#64. Which was the first PC boot sector virus?
#65. It hides the true network addresses and used to intercept all messages entering and leaving the network.
The correct answer is “Proxy server.”
A proxy server is a network intermediary that sits between a client device and the destination server. It acts as an intermediary for client requests, forwarding those requests to the appropriate server and returning the responses back to the client.
One of the main functions of a proxy server is to hide the true network addresses (IP addresses) of the client devices making the requests. When a client device sends a request to a server through a proxy server, the destination server sees the IP address of the proxy server instead of the actual IP address of the client device.
This ability to hide the true network addresses makes proxy servers useful for several purposes, including intercepting and monitoring network traffic. By intercepting all messages entering and leaving the network, a proxy server can inspect and analyze the content of the messages, apply filtering or access control policies, and provide additional security measures such as caching and encryption.
Firewalls, on the other hand, are network security devices or software that monitor and control network traffic to protect against unauthorized access and potential threats. Patches are software updates or modifications designed to fix issues or vulnerabilities in software applications. A logic bomb is a type of malicious code that executes a specific action when triggered.
Therefore, the correct answer is “Proxy server.”
#66. It is a software program designed to record (log) every keystroke on the machine on which it runs.
The correct answer is “Keylogger.” A keylogger is a software program designed to record or log every keystroke made on the machine on which it is installed. It can capture keyboard inputs, including passwords, usernames, credit card numbers, and other sensitive information. Keyloggers can be used for legitimate purposes, such as monitoring computer activity for parental control or employee monitoring, but they can also be used maliciously to steal personal information without the user’s knowledge.
#67. The legal right to use software based on specific restrictions is granted via a
The correct answer is “software license.” The legal right to use software based on specific restrictions is typically granted through a software license. A software license is a legal agreement between the software owner (licensor) and the user (licensee) that outlines the terms and conditions under which the software can be used. It specifies the rights and limitations of the user, such as the number of installations, permitted usage, redistribution rights, and any other applicable restrictions or obligations. The license agreement serves as a contract between the software owner and the user, defining the rights and responsibilities of each party regarding the software’s usage.
#68. ......... refers to the unauthorised copying and distribution of software.
The correct answer is “Software piracy.” Software piracy refers to the unauthorized copying, distribution, or use of software without the proper license or permission from the software owner. It involves the infringement of copyright laws that protect software as intellectual property. Software piracy can occur through various means, such as making unauthorized copies of software, sharing software through file-sharing networks, downloading software from unauthorized sources, or using counterfeit software. It is important to respect software copyrights and obtain proper licenses to use software legally.