Basic Computer Security Questions and Answers

Take Exam

Understanding Basic Computer Security is vital for anyone aiming to work in IT, cybersecurity, or network management roles. This topic focuses on protecting data, devices, and systems from unauthorized access or damage. In this section, you’ll find Basic Computer Security questions with answers designed for competitive exams like SSC, Infosys, and IBM placement tests. These aptitude questions with explanations cover essential concepts such as encryption, authentication, malware, firewalls, and safe online practices. Practicing these computer security aptitude questions helps you develop logical awareness about modern cyber threats and countermeasures. By going through this section, you’ll improve your readiness for both technical and general awareness parts of placement and certification exams.

Basic Computer Security

Showing 10 of 26 questions

21. Script kiddie is

  • someone who subverts computer security without authorization or who uses technology(usually a computer or the internet) for terrorism, vandalism (malicious destruction ), credit card fraud, identity theft, intellectual property theft, or many other types
  • a person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
  • hacker who utilizes technology to announce a political message.
  • None of these
Show Answer Report

22. Hacktivism is

  • someone who subverts computer security without authorization or who uses technology (usually a computer or the internet for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types o
  • a person, usually not an expert in computer security, who breaks into computer systems by using pre-packaged automated tools written by others.
  • hacker who utilizes technology to announce a political message.
  • None of these
Show Answer Report

23. It is a prepared aplication that takes advantage of a known  weakness.

  • security exploit
  • vulnerability scanner
  • packet sniffer
  • rootkit
Show Answer Report

24. It is a tool used to quickly check computers on a network for known weknesses.

  • security exploit
  • vulnerability scanner
  • packet sniffer
  • rootkit
Show Answer Report

25. It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

  • security exploit
  • vulnerability scanner
  • packet sniffer
  • rootkit
Show Answer Report

26. It is a situation in which one person  or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access

  • security exploit
  • vulnerability scanner
  • packet sniffer
  • rootkit
Show Answer Report
Questions and Answers for Competitive Exams Various Entrance Test