1. If your computer rebooting itself then it is likely that ..[SBI Clerk 2012]

(1) It has a virus

(2) It does not have enough memory 

(3) There is no printer

(4)There has been a power surge 

(5) It need a CD-ROM 

2. Junk E-mail is also called [Union Bank of India 2011 

(1) spam

(2) spoof 

(3) sniffer script

(4) spool 

(5) None of these 

3. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a Allahabad Bank PO 2011] 

(1) spammer

(2) hacker 

(3) instant messenger 

(4) All of these

(5) None of these 

4. Vendor created program modifications are called [Allahabad Bank PO 2011] 

(1) patches

(2) anti-viruses 

(3) hales

(4) fixes 

(5) overlaps 

5. A…..is anything that can cause harm.

(1) vulnerability 

(2) phishing 

(3) threat

(4) spoof 

(5) None of these

6. A….. is a small program embeded inside of a GIF image.

(1) web bug

(2) cookie 

(3) spyware application 

(4) spam 

(5) None of these above

7.A hacker contacts your phone or E-mails and mpts to acquire your password is called

(1) spoofing

(2) phishing 

(3) spamming 

(4) buging

(5) None of these

8.the phrase……… describes viruses, worms, trojan horse attack applets and attack scripts. 

(1) malware 

(2) spam 

(3) phishing

(4) virus 

(5) None of these

9. Hackers often gain entry to a network be pretending to be at a legitimate computer 

(1) spoofing

(2) forging

(3) IP spoofing 

(4) None of these 

10. The …… of a threat measures its potential impact on a system [IBPS Clerk 2011) 

(1) vulnerabilities

(2) counter measures 

(4) susceptibility

(3) degree of harm

(5) None of these 

11. The main reason to encrypt a file is to

(1) reduce its size 

(2) secure it for transmission 

(3) prepare it for backup 

(4) include it in the start-up sequence

(5) None of the above 

12. A digital signature is [SBI Clerk 2011] 

(1) scanned signature 

(2) signature in binary form 

(3) encrypting information 

(4) handwritten signature

(5) None of the above 

13. Mechanism to protect network from outside attack is 

(1) firewall

(2) anti-virus 

(3) digital signature 

(4) formatting 

(5) None of these

14. A firewall operated by [SBI Clerk 2010]

(1) the pre-purchase phase 

(2) isolating intranet from extranet 

(3) screening packets to/from the network and provide controllable filtering of network traffic 

(4) All of the above

(5) None of the above 

15. Which one of the following is a cryptographic protocol used to secure http connection? [RBI PO 2009]

(1) Stream Control Transmission Protocol (SCTP)

(2) Transport Layer Security (TLS) 

(3) Explicit Congestion Notification (ECN) 

(4) Resource Reservation Protocol (RRP) 

(5) None of the above

16. …. Are  attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011] 

(1) Phishing triks

(2) Computer viruses 

(3) Spyware scams

(4) Viruses 

(5) Phishing scams 

17. …. is a form of virus explicitly designed to hide itself from detection by anti-virus software. 

(1) Stealth virus

(2) Polymorphic virus 

(3) Parasitic virus 

(4) Macro virus

(5) None of these 

18. All of the following are examples of real-security and privacy risks except [SBI PO 2011) 

(1) hackers

(2) spam 

(3) viruses

(4) identify theft 

(5) None of these 

19. The first PC virus was developed in 

(1) 1980

(2) 1984 

(3) 1986

(4) 1988 

(5) 1987 

20. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ? [IBPS Clerk 2010) 

(1) Spoofing

(2) Phishing 

(3) Stalking

(9) Hacking 

(5) None of these

21. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself? [SBI PO 2011] 

(1) Trojan horse 

(2) Logic bomb 

(3) Cracker

(4) Firewall 

(5) None of these 

22. Abuse messaging systems to send unsolicited is 

(1) phishing

(2) spam 

(3) malware

(4) firewall 

(5) adware 

23. …. are often delivered to PC through an E-mail attachment and are often designed to do harm.

(1) Viruses

(2) Spam

(4) Email messages

(3) Portals 

(5) None of these

24. Which one of the following is a key function firewall? [SBI PO 2010

]

(1) Monitoring

(2) Deleting 

(3) Copying

(4) Moving 

(5) None of these 

25. Viruses, trojan horses and worms are [IBPS Clerk 2012]

(1) able to harm computer system 

(2) unable to detect if present on computer 

(3) user-friendly applications 

(4) harmless applications resident on computer

(5) None of the above 

26. Computer virus is (IBPS Clerk 2011

(1) a hardware 

(2) windows tool 

(3) a computer program 

(4) a system software

(5) None of the above 

27. The first computer virus is 

(1) creeper

(2) PARAM 

(3) the famous

(4) HARLIE 

(5) None of these 

28. A time bomb occurs during a particular

(1) data or time 

(2) logic and data 

(3) only time

(4) All of the above 

(5) None of these 

29. First boot sector virus is 

(1) computed

(2) mind 

(3) brain

(4) Elk Cloner 

(5) None of these

30. Which virus spre in application software?

(1) Macro virus 

(2) Boot virus 

(3) File virus 

(4) Anti-virus

(5) None of the above 

31. Some viruses have a delayed payload, which sometimes called a 

(1) time

(2) anti-virus 

(3) bomb

(4) All of these 

(5) None of these 

32. An anti-virus is a

(1) program code 

(2) computer 

(3) company name 

(4) application software 

(5) None of the above

33. Trend Micro’ is a

(1) virus program 

(2) anti-virus software 

(3) just a program

(4)All of these 

(5) None of the above

34. It is a self-replicating program that infects computer and spre by inserting copies of itself into other executable code or documents.

(1) Keylogger 

(2) Worm 

(3) Virus 

(4) Cracker

(5) None of the above 

35. Like a virus, it is a self-replicating program. It also propagates through computer network. 

(1) Spyware 

(2) Worm 

(3) Cracker 

(4) phishing scam 

(5) None of these

36. What is an E-main attachment?

(1) A receipt sent by the recipient 

(2) A separate document from another program sent along with an E-mail

message 

(3) A malicious parasite that feeds off your messages and destroys the contents 

(4) A list of Cc : or Bcc : recipients 

(5) A friend to whom E-mail is sent regularly

37. Passwords enables users to

(1) get into the system quickly 

(9) make efficient use of time 

(3) retain confidentiality of files 

(4) simplify file structure

(5) None of the above 

38. A program designed to destroy data on your computer which can travel to infect other computers, is called a 

(1) disease

(2) tarpedo 

(3) hurricave 

(4) virus 

(5) None of these

13.MCQ Computer Security