

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams .
1. |
A vulnerability scanner is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» B. a tool used to quickly check computers on a network for known weaknesses. |
2. |
A packet sniffer is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» C. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
3. |
These hacker breaks security for altruistic or at least non-malicious reasons. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» A. White hat |
4. |
This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» B. Grey hat |
5. |
This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. |
A. | White hat |
B. | Grey hat |
C. | Blue hat |
D. | None of these |
Answer» C. Blue hat |
6. |
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs |
A. | Keylogger |
B. | Worm |
C. | Virus |
D. | Cracker |
Answer» A. Keylogger |
7. |
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. |
A. | Keylogger |
B. | Worm |
C. | Virus |
D. | Cracker |
Answer» C. Virus |
8. |
Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks. |
A. | Keylogger |
B. | Worm |
C. | Cracker |
D. | None of these |
Answer» B. Worm |
9. |
Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called? |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Trojan horses |
10. |
These are program designed as to seem to being or be doing one thing, but actually being or doing another. |
A. | Trojan horses |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Trojan horses |
11. |
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
A. | Rootkit |
B. | Keylogger |
C. | Worm |
D. | Cracker |
Answer» A. Rootkit |
12. |
Packet Sniffer is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» A. an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
13. |
Rootkit is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» B. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
14. |
Spoofing attack is |
A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
D. | None of these |
Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
15. |
Security exploit is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» A. a prepared application that takes advantage of a known weakness. |
16. |
A spoofing attack is |
A. | a prepared application that takes advantage of a known weakness. |
B. | a tool used to quickly check computers on a network for known weaknesses. |
C. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
D. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
Answer» D. a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
17. |
White hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» A. hacker breaks security for altruistic or at least non-malicious reasons. |
18. |
Grey hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» B. hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
19. |
Blue hat is |
A. | hacker breaks security for altruistic or at least non-malicious reasons. |
B. | hacker of ambiguous ethics and/or borderline legality, often frankly admitted. |
C. | someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
Answer» C. someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be clos |
20. |
Black hat is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» A. someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
21. |
Script kiddie is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» B. a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
22. |
Hacktivism is |
A. | someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. |
B. | a person, usually not an expert in computer security, who breaks into computer systems by using pre- packaged automated tools written by others. |
C. | hacker who utilizes technology to announce a political message. |
D. | None of these |
Answer» C. hacker who utilizes technology to announce a political message. |
23. |
It is a prepared application that takes advantage of a known weakness. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» A. security exploit |
24. |
It is a tool used to quickly check computers on a network for known weaknesses. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» B. vulnerability scanner |
25. |
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» C. packet sniffer |
26. |
It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
A. | security exploit |
B. | vulnerability scanner |
C. | packet sniffer |
D. | rootkit |
Answer» A. security exploit |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.