adplus-dvertising

Welcome to the Computer Security MCQs Page

Dive deep into the fascinating world of Computer Security with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Computer Security, a crucial aspect of IT Fundamentals. In this section, you will encounter a diverse range of MCQs that cover various aspects of Computer Security, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within IT Fundamentals.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Computer Security. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of IT Fundamentals.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Computer Security. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Computer Security MCQs | Page 2 of 11

Q11.
Which of the following is/are threats for electronic payment systems?
Discuss
Answer: (d).All of the above
Q12.
A virus that migrates freely within a large population of unauthorized email user is called a -------
Discuss
Answer: (a).macro
Q13.
-------- are attempts by individuals to obtain confidential information from you to falsifying their identity.
Discuss
Answer: (a).Phishing scams
Discuss
Answer: (a).hard to assure identity of user on a remote system
Q15.
A -------- is a computer program that can replicate itself and spread from one computer to another.
Discuss
Answer: (b).Computer Virus
Q16.
Which of the following virus overtake computer system, when it boots and destroy information?
Discuss
Answer: (a).Stealth virus
Discuss
Answer: (b).Spyware
Q18.
To protect yourself from computer hacker, you should turn on a
Discuss
Answer: (a).Firewall
Q19.
Firewalls are used to protect against --------
Discuss
Answer: (c).unauthorised access
Q20.
Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
Discuss
Answer: (b).Worm
Page 2 of 11

Suggested Topics

Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!