adplus-dvertising

Welcome to the Computer Security MCQs Page

Dive deep into the fascinating world of Computer Security with our comprehensive set of Multiple-Choice Questions (MCQs). This page is dedicated to exploring the fundamental concepts and intricacies of Computer Security, a crucial aspect of IT Fundamentals. In this section, you will encounter a diverse range of MCQs that cover various aspects of Computer Security, from the basic principles to advanced topics. Each question is thoughtfully crafted to challenge your knowledge and deepen your understanding of this critical subcategory within IT Fundamentals.

frame-decoration

Check out the MCQs below to embark on an enriching journey through Computer Security. Test your knowledge, expand your horizons, and solidify your grasp on this vital area of IT Fundamentals.

Note: Each MCQ comes with multiple answer choices. Select the most appropriate option and test your understanding of Computer Security. You can click on an option to test your knowledge before viewing the solution for a MCQ. Happy learning!

Computer Security MCQs | Page 3 of 11

Q21.
-------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.
Discuss
Answer: (a).Antivirus
Discuss
Answer: (d).Virus
Discuss
Answer: (b).The CD–ROM stops functioning
Q24.
…………….. are used in denial of service attacks, typically against targeted web sites.
Discuss
Answer: (b).Zombie
Q25.
Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
Discuss
Answer: (a).ii, i, iv and iii
Q26.
A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
Discuss
Answer: (d).Parasitic Virus
Q27.
…………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
Discuss
Answer: (c).Stealth virus
Q28.
A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
Discuss
Answer: (a).Polymorphic Virus
Q29.
A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
Discuss
Answer: (d).mutation engine
Q30.
State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code.
Discuss
Answer: (c).Both i and ii
Page 3 of 11

Suggested Topics

Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.

Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!