Computer and Security MCQs for Competitive Examination Q. 1Which of the following is an anti-virus program? (A) Norton(B) AVAST(C) Quick Heal(D) All of the above Show Answer/Hide Answer Answer: (D) All of the aboveExplanation: N/A Q. 2Unsolicited commercial E-Mail is known as (A) Spam(B) Malware(C) Virus(D) Spyware Show Answer/Hide Answer Answer: (A) SpamExplanation: N/A Q. 3The first computer virus is (A) Creeper(B) Trojan(C) PARAM(D) Morris Show Answer/Hide Answer Answer: (A) CreeperExplanation: N/A Q. 4Software such as Virus, Worms and Trojan Horses that has a malicious content is known as (A) Malicious software (malware)(B) Spyware(C) Firewall(D) Spyware Show Answer/Hide Answer Answer: (A) Malicious software (malware)Explanation: N/A Q. 5All of the following are examples real security and privacy risks except (A) Hackers(B) Spam(C) Viruses(D) Identity theft Show Answer/Hide Answer Answer: (B) SpamExplanation: N/A Q. 6It protects a network from potential malicious attacks, and also limit offensive web site or questionable e-mail attachments. (A) Firewall(B) Antivirus(C) Cookies(D) Malware Show Answer/Hide Answer Answer: (A) FirewallExplanation: N/A Q. 7_______________ are people who break into another person’s computer with malicious intentions. (A) Hackers(B) Crackers(C) Virus(D) Malware Show Answer/Hide Answer Answer: (A) HackersExplanation: N/A Q. 8A secret word that you set to protect a file or your computer (A) Password(B) User id(C) Cookies(D) PIN Show Answer/Hide Answer Answer: (A) PasswordExplanation: N/A Q. 9The process of converting data into symbols as a safeguard against hackers and crackers is called (A) Encryption(B) Antivirus(C) Decryption(D) Decipher Show Answer/Hide Answer Answer: (A) EncryptionExplanation: N/A Q. 10______________ are people who breakt into computers, cause damage and steal data. (A) Hackers(B) Crackers(C) Virus(D) Spyware Show Answer/Hide Answer Answer: (B) CrackersExplanation: N/A Q. 11________________ are attempts by individuals to obtain confidential information from you by falsifying their identity. (A) Phishing trips(B) Spyware scams(C) Phishing scams(D) Viruss Show Answer/Hide Answer Answer: (A) Phishing tripsExplanation: N/A Q. 12Viruses, trojan horses and worms are (A) Able to harm a computer system(B) Unable to detect if present on computer(C) User-friendly applications(D) Harmless applications resident of computer Show Answer/Hide Answer Answer: (A) Able to harm a computer systemExplanation: N/A Q. 13 The unauthorised copying and distributing of software is known as (A) Cracking(B) Software piracy(C) Software literacy(D) Cracking Show Answer/Hide Answer Answer: (B) Software piracyExplanation: N/A Q. 14Verification of a login name and password is known as (A) Configuration(B) Authentication(C) Logging in(D) Accessibility Show Answer/Hide Answer Answer: (B) AuthenticationExplanation: N/A Q. 15Computer virus is (A) A hardware(B) Windows tool(C) A computer program(D) A system software Show Answer/Hide Answer Answer: (C) A computer programExplanation: N/A Share on facebook Share on twitter Share on linkedin Share on pinterest Share on reddit Share on whatsapp Share on email Share on telegram