MCQs with Solutions for all Competitive Examinations

Computer and Security MCQs for Competitive Examination

Q. 1
Which of the following is an anti-virus program?

(A) Norton
(B) AVAST
(C) Quick Heal
(D) All of the above

Answer: (D) All of the above
Explanation: N/A

Q. 2
Unsolicited commercial E-Mail is known as

(A) Spam
(B) Malware
(C) Virus
(D) Spyware

Answer: (A) Spam
Explanation: N/A

Q. 3
The first computer virus is 

(A) Creeper
(B) Trojan
(C) PARAM
(D) Morris

Answer: (A) Creeper
Explanation: N/A

Q. 4
Software such as Virus, Worms and Trojan Horses that has a malicious content is known as

(A) Malicious software (malware)
(B) Spyware
(C) Firewall
(D) Spyware

Answer: (A) Malicious software (malware)
Explanation: N/A

Q. 5
All of the following are examples real security and privacy risks except

(A) Hackers
(B) Spam
(C) Viruses
(D) Identity theft

Answer: (B) Spam
Explanation: N/A

Q. 6
It protects a network from potential malicious attacks, and also limit offensive web site or questionable e-mail attachments.

(A) Firewall
(B) Antivirus
(C) Cookies
(D) Malware

Answer: (A) Firewall
Explanation: N/A

Q. 7
_______________ are people who break into another person’s computer with malicious intentions.

(A) Hackers
(B) Crackers
(C) Virus
(D) Malware

Answer: (A) Hackers
Explanation: N/A

Q. 8
A secret word that you set to protect a file or your computer

(A) Password
(B) User id
(C) Cookies
(D) PIN

Answer: (A) Password
Explanation: N/A

Q. 9
The process of converting data into symbols as a safeguard against hackers and crackers is called

(A) Encryption
(B) Antivirus
(C) Decryption
(D) Decipher

Answer: (A) Encryption
Explanation: N/A

Q. 10
______________ are people who breakt into computers, cause damage and steal data.

(A) Hackers
(B) Crackers
(C) Virus
(D) Spyware

Answer: (B) Crackers
Explanation: N/A

Q. 11
________________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(A) Phishing trips
(B) Spyware scams
(C) Phishing scams
(D) Viruss

Answer: (A) Phishing trips
Explanation: N/A

Q. 12
Viruses, trojan horses and worms are 

(A) Able to harm a computer system
(B) Unable to detect if present on computer
(C) User-friendly applications
(D) Harmless applications resident of computer

Answer: (A) Able to harm a computer system
Explanation: N/A

Q. 13
The unauthorised copying and distributing of software is known as

(A) Cracking
(B) Software piracy
(C) Software literacy
(D) Cracking

Answer: (B) Software piracy
Explanation: N/A

Q. 14
Verification of a login name and password is known as

(A) Configuration
(B) Authentication
(C) Logging in
(D) Accessibility

Answer: (B) Authentication
Explanation: N/A

Q. 15
Computer virus is

(A) A hardware
(B) Windows tool
(C) A computer program
(D) A system software

Answer: (C) A computer program
Explanation: N/A

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on reddit
Share on whatsapp
Share on email
Share on telegram