Basic Computer Security Questions and Answers

Take Exam

Understanding Basic Computer Security is vital for anyone aiming to work in IT, cybersecurity, or network management roles. This topic focuses on protecting data, devices, and systems from unauthorized access or damage. In this section, you’ll find Basic Computer Security questions with answers designed for competitive exams like SSC, Infosys, and IBM placement tests. These aptitude questions with explanations cover essential concepts such as encryption, authentication, malware, firewalls, and safe online practices. Practicing these computer security aptitude questions helps you develop logical awareness about modern cyber threats and countermeasures. By going through this section, you’ll improve your readiness for both technical and general awareness parts of placement and certification exams.

Basic Computer Security

Showing 10 of 26 questions

11. It is a toolkit for hiding the fact that a computer's security has been compromised, is a general discription of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

  • Rootkit
  • Keylogger
  • Worm
  • Cracker
Show Answer Report

12. Packet Sniffer is

  • an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illigitimate access.
  • a toolkit for hiding the fact that a computer's security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  • None of these
Show Answer Report

13. Rootkit is

  • an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegimate access.
  • a toolkit for hiding the fact that a computer's security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules )operators.
  • None of these
Show Answer Report

14. Spoofing attach is

  • an appliation that captures TCP/IP data packets, which can maiciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
  • a toolkit for hiding the fact that a computer's secirity has been compromised, is a general description of a set of programs whch work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
  • None of these
Show Answer Report

15. Security exploit is

  • a perpared application that takes advantage of a knwn weakness.
  • a tool used to quickly check computers on a network for known weaknesses.
  • an application that captures TCP/IP data packets, which can maliciousy be used to capture passwords and other data while it is in transit either withn the computer or over the network.
  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegimate access.
Show Answer Report

16. a spoofing attack is

  • a prepared application that takes advantage of a known weakness.
  • a tool used to quickly check computers on a network for known weaknesses.
  • an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
  • a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining ilegiitimate access.
Show Answer Report

17. White hat is

  • hacker breaks security for altruistic or at least non-malicious reasons.
  • hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  • Someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for expliuts so they can be closed.
  • None of these
Show Answer Report

18. Grey hat is

  • hacker breaks security for altruistic or at least non-malicious reasons.
  • hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
  • Some outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  • None of these
Show Answer Report

19. Blue hat is

  • hacker breaks suricity for altruistic or at least non-malicious reasons
  • hacker of ambguous ethics and/or borderline legality, often frankly admitted.
  • Someone outside computer security cosnsultng firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
  • None of these
Show Answer Report

20. Black hat is

  • someone who sobverts computer security without authorization or who uses technology (usually a computer or the internet )for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types
  • a person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged utomated tools written by others.
  • hacker who utilizes technology to announce a political message.
  • None of these
Show Answer Report
Questions and Answers for Competitive Exams Various Entrance Test