Computer Security

11. What is a keylogger?
a. A type of malware that records every keystroke made by a user in order to steal sensitive information such as passwords.
b. A type of computer software that helps improve performance.
c. A type of computer peripheral device.
d. A type of computer hardware

View Answer >

12. What is a ransomware attack?
a. A type of attack in which an attacker encrypts a victim’s data and demands payment in exchange for the decryption key.
b. A type of attack in which an attacker physically steals data from a computer system.
c. A type of attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.

View Answer >

13. What is two-factor authentication?
a. A security process in which a user is required to provide two different types of identification in order to access a system or application.
b. A security process in which a user is only required to provide one type of identification in order to access a system or application.
c. A security process in which a user is required to provide three different types of identification in order to access a system or application.
d. None of the above.

View Answer >

14. What is a virtual private network (VPN)?
a. A network that allows users to securely connect to a private network over the internet.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

15. What is a patch?
a. A software update that fixes security vulnerabilities or other issues.
b. A type of computer hardware.
c. A type of computer peripheral device.
d. A type of computer software that helps improve performance.

View Answer >

16. What is a vulnerability?
a. A weakness in a computer system or application that can be exploited by attackers.
b. A strength in a computer system or application that can be exploited by attackers.
c. A feature in a computer system or application that makes it more difficult to attack.
d. None of the above.

View Answer >

17. What is a security audit?
a. A systematic evaluation of a computer system or application to identify security weaknesses and recommend solutions.
b. A process of designing and developing software for computers.
c. A process of making computers faster.
d. None of the above.

View Answer >

18. What is the difference between a vulnerability assessment and a penetration test?
a. A vulnerability assessment identifies security weaknesses, while a penetration test attempts to exploit those weaknesses to gain access to the system or application.
b. A vulnerability assessment attempts to exploit security weaknesses, while a penetration test identifies those weaknesses.
c. A vulnerability assessment and a penetration test are the same thing.
d. None of the above.

View Answer >

19. What is a security policy?
a. A set of rules and guidelines that dictate how an organization will protect its computer systems and data.
b. A process of designing and developing software for computers.
c. A process of making computers faster.
d. None of the above.

View Answer >

20. What is social engineering?
a. A type of attack in which an attacker uses psychological manipulation to trick people into giving away sensitive information or performing an action that compromises security.
b. A type of attack in which an attacker physically breaks into a building in order to steal data.
c. A type of attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.

View Answer >

Leave a Comment

Note:- All Study Material Job Notice/Results/Exams/Marks/Admit Card published on this website is only for immediate information purpose. This information is not to be a Legal Document/Information. If in case any mistake, error and maybe wrong, then this website is not responsible. WE DONT HAVE ANY YOUTUBE CHANNEL.