Security System & IT MCQs > FREE SET - 1


1. A proxy firewall filters at the
A Physical layer
B Application layer
C Data link layer
D Network layer

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

2. Computer viruses can multiply and spread from one computer to another by the means of
A Infected disk
B Links to a network
C Downloaded program from a bulletin board
D All of the above.

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

3. Some viruses have delayed payload, which is sometimes called a ____________.
A Anti-virus
B Bomb
C Action
D Time

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

4. McAfee is an example of __________.
A Antivirus
B Trojan
C Virus
D Anti spam

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

5. What is true about computer worms?
A They are not harmful to the system.
B They perform the functions of Trojans.
C They are used for identity theft for remote login.
D They are similar to viruses in that they replicate functional copies of themselves.

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

6. Who invented the term computer virus?
A Frederick Cohen
B MC Fee
C Smiths
D Norton

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

7. NORTON is an _________?
A Software
B Anti-Virus
C Program
D Network

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

8. Computer security can be applied by using which of the following?
A Firewall
B Password
C Encryption
D All of the above

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

9. Network Firewalls are used to protect against ____________.
A Unauthorized Attacks
B Data Driven Attacks
C Virus Attacks
D Fire Attacks

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

10. What is Firewall in Computer Network?
A The physical boundary of Network
B A system designed to prevent unauthorized access
C An operating System of Computer Network
D A web browsing Software

Free MCQs www.sharemcq.com     Answer: Option B
Explanation:
Available Soon.

11. Which of the following is a security process that relies on the unique biological characteristics of an individual to verify.
A AADHAR
B CAPTCHA
C BIOMETRICS
D PAN CARD

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

12. The first Computer Virus is __________.
A Creeper
B Sasser
C Blaster
D All of the above

Free MCQs www.sharemcq.com     Answer: Option A
Explanation:
Available Soon.

13. The Sub Seven is an example of
A Antivirus
B Spyware
C Spam
D Trojan horse

Free MCQs www.sharemcq.com     Answer: Option D
Explanation:
Available Soon.

14. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A Haptics
B Caves
C Biometrics
D RFID

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.

15. Software programs that close potential security breaches in an operating system :
A Refresh patches
B Security breach fixes
C Security patches
D Fresh patches

Free MCQs www.sharemcq.com     Answer: Option C
Explanation:
Available Soon.


No comments:

Post a Comment

Your Feedback is hearty Requested to make the MCQs Collection better.

Popular Posts