Computer Security

WhatsApp Channel Join Now
Telegram Group Join Now

71. What is a digital signature?
a. A cryptographic technique that is used to verify the authenticity and integrity of a digital document or message.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

72. What is a firewall?
a. A network security device that monitors and controls incoming and outgoing network traffic.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

73. What is a proxy server?
a. A server that acts as an intermediary between a client and a server, typically used to filter or control access to web content.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

74. What is a honeypot?
a. A decoy system that is designed to lure attackers and gather information about their methods and activities.
b. A type of computer virus.
c. A security feature that prevents unauthorized access to a computer system or network.
d. None of the above.

Answer: a.
View Answer >

75. What is steganography?
a. The practice of hiding a message or file within another file, such as an image or audio file, to avoid detection.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

76. What is a keylogger?
a. A type of software that records every keystroke made on a computer, often used for malicious purposes.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

77. What is a rootkit?
a. A type of malware that is designed to hide its presence on a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

78. What is a botnet?
a. A network of compromised computers that are controlled by an attacker to carry out malicious activities.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a.
View Answer >

79. What is ransomware?
a. A type of malware that encrypts a victim’s data and demands payment in exchange for the decryption key.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

Answer: a
View Answer >

80. Which of the following is a common type of phishing attack?
a. Spear phishing
b. Whale phishing
c. Vishing
d. All of the above

Answer: d.
View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now

Leave a reply

  • Default Comments (0)
  • Facebook Comments

telegram Join Telegram
Join Now Join Now