The Chennai School Of banking

COMPUTER KNOWLEDGE Computer Security

Question No : 1

 If your computer rebooting itself then it is likely that
(1) It has a virus
(2) It does not have enough memory
(3) There is no printer
(4) There has been a power surge
(5) It need a CD-ROM
 

Question No : 2

Junk E-mail is also called
(1) spam
(2) spoof
(3) sniffer script
(4) spool
(5) None of these
 

Question No : 3

A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a
(1) Spammer
(2) hacker
(3) instant messenger
(4) All of these
(5) None of these

Question No : 4

Vendor created program modifications are called
(1) patches
(2) anti-viruses
(3) hales
(4) fixes
(5) overlaps

Question No : 5

A _____ is a small program embedded inside of a GIF image.
(1) web bug
(2) spyware application
(3) cookie
(4) spam
(5) None of these

Question No : 6

A hacker contacts your phone or E-mails and attempts to acquire your password is called
(1) spoofing
(2) phishing
(3) spamming
(4) bugging
(5) None of these

Question No : 7

The phrase _____ describes viruses, worms, Trojan horse attack applets and attack scripts.
(1) malware
(2) spam
(3) phishing
(4) virus
(5) None of these
 

Question No : 8

Hackers often gain entry to a network be pretending to be at a legitimate computer
(1) spoofing
(2) forging
(3) IP spoofing
(4) phishing
(5) None of these
 

Question No : 9

The _____ of a threat measures its potential impact on a system.
(1) vulnerabilities
(2) counter measures
(3) degree of harm
(4) susceptibility
(5) None of these

Question No : 10

The main reason to encrypt a file is to
(1) secure it for transmission
(2) include it in the start-up sequence
(3) prepare it for backup
(4) reduce its size
(5) None of these
 

Question No : 11

A digital signature is
(1) scanned signature
(2) signature in binary form
(3) encrypting information
(4) handwritten signature
(5) None of these
 

Question No : 12

Mechanism to protect network from outside attack is
(1) firewall
(2) anti-virus
(3) digital signature
(4) formatting
(5) None of these

Question No : 13

______ are attempts by individuals to obtain confidential information from you by falsifying
(1) Phishing tricks
(2) Computer viruses
(3) Spy ware scams
(4) Viruses
(5) Phishing scams

Question No : 14

_____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
(1) Stealth virus
(2) Polymorphic virus
(3) Parasitic virus
(4) Macro virus
(5) None of these

Question No : 15

A firewall operated by
(1) the pre-purchase phase
(2) isolating  intranet from extranet
(3) screening packets to /from the network and provide controllable filtering of network traffic
(4) All of the above
(5) None of these
 

Question No : 16

Which one of the following is a cryptographic protocol used to secure http connection?
(1) Stream Control Transmission Protocol (SCTP)
(2) Transport Layer Security (TLS)
(3) Explicit Congestion Notification (ECN)
(4) Resource Reservation Protocol (RRP)
(5) None of these

Question No : 17

All of the following are examples  of real-security and privacy risks except
(1) hackers
(2) spam
 (3) viruses
(4) identify theft
(5) None of these

Question No : 18

The first PC virus was developed in
(1) 1980
(2) 1984
(3) 1986
(4) 1988
(5) 1987

Question No : 19

Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication?
(1) Spoofing
(2) Phishing
(3) Stalking
(4) hacking
(5) None of these

Question No : 20

Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
(1) Trojan horse
(2) Logic bomb
(3) Cracker
(4) Firewall
(5) None of these

Question No : 21

Which one of the following is a key function of firewall?
(1) Monitoring
(2) Deleting
(3) Copying
(4) Moving
(5) None of these

Question No : 22

 Viruses, Trojan horses and worms are
(1) able to harm computer system
(2) unable to detect if present on computer
(3) user-friendly applications
(4) harmless applications resident on computer
(5) None of these
 

Question No : 23

Computer Virus is
(1) a hardware
(2) windows tool
(3) a computer program
(4) a system software
(5) None of these

Question No : 24

A time bomb occurs during a particular
(1) data or time
(2) logic and data
(3) only time
(4) All of the above
(5) None of these
 

Question No : 25

The first computer virus is
(1) creeper
(2) PARAM
(3) the famous
(4) HARLIE
(5) None of these

Question No : 26

 First boot sector virus is
(1) computed
(2) mind
(3) brain
(4) Elk Cloner
(5) None of these
 

Question No : 27

Which virus spreads in application software?
(1) Macro virus
(2) Boot virus
(3) File virus
(4) Anti-virus
(5) None of these
 

Question No : 28

Some viruses have a delayed payload, which is sometimes called a
(1) time
(2) anti-virus
(3) bomb
(4) All of these
(5) None of these
 

Question No : 29

An anti-virus is a
(1) program code
(2) computer
(3) company name
(4) application software
(5) None of these
 

Question No : 30

‘Trend Micro’ is a
(1) virus program
(2) anti-virus software
(3) just a program
(4) All of these
(5) None of these
 

Question No : 31

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
(1) Key logger
(2) Worm
(3) Virus
(4) Cracker
(5) None of these

Question No : 32

Like a virus it is a self-replicating program. It also propagates through computer network.
(1) Spy ware
(2) Worm
(3) Cracker
(4) Phishing scam
(5) None of these
 

Question No : 33

What is an E-mail attachment?
(1) A receipt sent by the recipient
(2) A separate document from another program sent along with an E-mail message
(3) A malicious parasite that feeds off your messages and destroys the contents
(4) A list of Cc : or Bcc : recipients
(5) A friend to whom E-mail is sent regularly
 

Question No : 34

Passwords enables users to
(1) get into the system quickly
(2) make efficient use of time
(3) retain confidentiality of files
(4) simplify file structure
(5) None of the above

Question No : 35

A program designed to destroy data on your computer which can travel to infect other computers, is called a
(1) disease
(2) torpedo
(3) hurricave
(4) virus
(5) None of these

Question No : 36

A proxy Server is used for which of the following?
(1) To provide security against unauthorized users
(2) To Process client requests for web pages
(3) To Process client requests for database access
(4) To Provide TCP / IP
(5) None of these
 

Question No : 37

What is the common name for the Crime of stealing password?
(1) Spoofing
(2) Spooling
(3) Identify theft
(4) Hacking
(5) None of these

Question No : 38

A digital certificate can identify
(A) a server
(B) an individual
(C) a company
(1) Only (A)
(2) Only (A) and (B)
(3) Only (B) and (C)
(4)  All A, B and C
(5) None of these

Question No : 39

A result of a computer virus cannot lead to ________
(1) Disk Crash
(2) Mother Board Crash
(3)  Corruption of program
(4) Deletion of files
(5) None of these

Question No : 40

Every Computer connected to an intranet or extranet must have a ____________
(1) Firewall
(2) Proxy Server
(3) IP Address
(4) Domain Name
(5) None of these
 

Question No : 41

A computer’s browser settings to that you redirected to websites that you had no intention of visiting _________
(1) Virus
(2) Trojan
(3) Hacker
(4) Browser Hijacker
(5) None of these

Question No : 42

Why should you delete unknown email attachments?
(1) you could go to jail
(2) The person could track you down and hurt you
(3) It is bad manners
(4) IT might contain a virus that could hurt you computer
(5) None of these

Question No : 43

Computer security can be increased by using?
(1) Firewall
2) Antivirus
(3) Password
(4) All of above
(5) None of these
 

Question No : 44

A (n) _____ allows you to access your e-mail from anywhere.
(1)  forum
(2) web mail interface
(3) message board
(4) web log
(5) None of these
 

Question No : 45

Cryptography includes the _________ to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication:
(1) Protocols
(2) Algorithms
(3) Strategies
(4) All of the Above
(5) None of These

Question No : 46

Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical areas of mathematics, especially those areas collectively known as _______ mathematics:
(1) Increte
(2) Discrete
(3) Both (1) and (2)
(4) Mis-Increte
(5) None of these
 

Question No : 47

Symmetric key cryptography was the only kind of encryption publicly known until:
(1) July 1995
(2) June, 1976
(3) June 1988
(4) June 1985
(5) None of these