We have compiled very important and most repeated questions for Security Online MCQs which are asked in academic as well as in different exams. Most importantly our Online MCQs will help you to evaluate and check your knowledge of computer and IT basics. These Computer Knowledge MCQs will help you to crack any competitive or academic exams.
Youth For Pakistan has provided an excellent opportunity for the students to prepare for their Computer Knowledge Online MCQs test. These Online Computer Knowledge MCQs cover all the topics including MS Powerpoint, MS Word, MS Excel, Information Technology, Hardware, Internet, Operating Systems, Keyboard Shortcuts, Network, Data Structure, DBMS, Security, Abbreviations, Computer Graphics, Output, Memory, Electronics, Input, Marketing, File Location, File Extensions, Software, Programming, Computer Basics, Windows, Binary, Discrete Mathematics, Data Communication, Compiler and OOPS.
The questions about computers are asked in almost every test whether it is for admission to some institutes or for recruitment purposes.
Security Online MCQs with Answers
We strongly recommend to all of our visitors that they attempt these Security Online MCQs tests more than one time after completing the preparation so that they can prepare for the Security MCQs in the best possible way.
1. Verification of a Login name and password is known as________.
Configuration
Accessibility
Authentication
Logging in
None of these
Correct Ans: Authentication
2. A clerk in a bank has to access data in customer account. Logical access control for these users would be
use of individual passwords
use of an Account Receivable Section password
use of individual passwords plus separate access
Can’t say
None of these
Correct Ans: use of individual passwords
3. "Trend Micro" is a ______________?
Virus program
Anti virus program
Application
All of the above
None of these
Correct Ans: Anti virus program
4. All of the following are example of real security and privacy risks except.
Hackers
Spam
Viruses
Identify theft
None of these
Correct Ans: Spam
5. A result of a computer Virus can not lead to.
Disk Crash
Motherboard crash
Deletion of files
Hard Disk failure
None of these
Correct Ans: Motherboard crash
6. Which of the following is not a popular Anti- Virus software ?
Kaspersky
Symantec
Trend Micro
Blaster
None of these
Correct Ans: Blaster
7. Le-Hard virus is effect of a ________________.
Command.com
Hardware
Software
Application
None of these
Correct Ans: Command.com
8. A hacker contacts you by phone or email and attempts to acquire your password is known as _______-.
spoofing
phishing
spamming
bugging
None of these
Correct Ans: phishing
9. Decryption & Encryption of data are the responsibility of the ______ layer.
Physical
Data link
Presentation
Session
Application
Correct Ans: Physical
10. Choose the right sequence of virus stages _________.
Triggering, Damage ,Dormancy,propagation
Damage, Triggering,Dormancy, propagation
Damage, Triggering,propagation ,Dormancy
Triggering, Damage,propagation, Dormancy
Dormancy, Propagation,Triggering, Damage
Correct Ans: Dormancy, Propagation,Triggering, Damage
11. Which of the following virus overtake computer system when it boots and destroy information ?
Trojan
System infectors
Boot infectors
Stealth virus
None of these
Correct Ans: Stealth virus
12. A sender must not be able to deny that he sent a specific message when he in fact did. This is an aspect of security called ______.
privacy
authentication
integrity
non-repudiation
None of these
Correct Ans: non-repudiation
13. A ________ is not a form of Biometrics.
fingerprint
password
retina scan
breath scan
None of these
Correct Ans: password
14. When a cracker attempts to misuse or steal data from a. system, it is called ________
Stealing
Intrusion
Virus
Worm
None of these
Correct Ans: Stealing
15. ________ -‘s main purpose is to prohibit unauthorized access to your computer via the Internet
Popup blocker
Firewall
Spyware
Spam assassin
None of these
Correct Ans: Firewall
16. In digital Signature the private key used for ________ and the public key for ______
Encryption ,decryption
Decryption,encryption
Plaintext,ciphertext
Ciphertext,plaintext
None of these
Correct Ans: Encryption ,decryption
17. The data to be encrypted at the sender site is called ________,The data to be decrypted at receiver end is called
Secret key,public key
Public key,secret key
Plaintext,ciphertext
Ciphertext,plaintext
None of these
Correct Ans: Secret key,public key
18. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.
802
800
801
805
None of these
Correct Ans: 802
19. Which of the following describes programs that can run independently, travel from system to system, and disrupt computer communications
Trojans
Viruses
Idlers
Droppers
Worms
Correct Ans: Worms
20. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
system virus
trojan horse virus
file virus
macro virus
None of these
Correct Ans: None of these