Basic Computer Security Questions and Answers
Understanding Basic Computer Security is vital for anyone aiming to work in IT, cybersecurity, or network management roles. This topic focuses on protecting data, devices, and systems from unauthorized access or damage. In this section, you’ll find Basic Computer Security questions with answers designed for competitive exams like SSC, Infosys, and IBM placement tests. These aptitude questions with explanations cover essential concepts such as encryption, authentication, malware, firewalls, and safe online practices. Practicing these computer security aptitude questions helps you develop logical awareness about modern cyber threats and countermeasures. By going through this section, you’ll improve your readiness for both technical and general awareness parts of placement and certification exams.
Basic Computer Security
1. A vulnerability scanner is
- a perpared application that takes advantage of a known weakness.
- a tool used to quickly check computers ohn a network for known weaknesses.
- an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the netwrk.
- A situation in which one person or program successfully masquerades as another by falsfying data and thereby gaining illegitimate access.
2. A packet sniffer is
- a prepared appication that takes advantage of a known weakness.
- a tool used to quickly check computers on a network for known weaknesses.
- an application that captures TCP/IP data packets. which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
- a situation in which one person or program successfully masquerades as another by falsfying data and thereby gaining illegtimate access.
3. These hacker breaks security for altruistic or at least non-malicious reasons.
- White that
- Grey hat
- Blue hat
- None of these
4. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
- white hat
- Grey hat
- Blue hat
- None of these
5. This hacker is someone outside computer secirity consulting firms that are used to bug test a system prior to its launch, looking for expliuts so they can be closed.
- White hat
- Grey hat
- Blue hat
- None of these
6. It is a software program designed to record ('log') every keystroke on the machne on whch it runs
- Keylogger
- Worm
- Virus
- Cracker
7. It is a self-replicating program that infects computer and sperads by inserting copies of itself into other executable code of documents.
- Keybogger
- Worm
- Virus
- Crcker
8. Like a virus, it is also a self-replicating program. the difference between a virus and it is that a worm does not create copies of itself on one system: It propagates through computer networks.
- Keylogger
- Worm
- Cracker
- None of these
9. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
- Trojan horses
- Keylogger
- Worm
- Cracker
10. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
- Trojan horses
- Keylogger
- Worm
- Cracker