37 : Computer Security - Various Attacks and Malware

Home >> Computer Awareness
123456789101112131415161718192021222324252627
1).
Which among the following is not a security / privacy risk? 
2).
Now a days Vishing has become a criminal practice of using social engineering over which of the following?
3).
When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __? 
4).
Which among the following is the most common source of Viruses to the hard disk of your computer?
5).
Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry? 
6).
As a person working in internet banking environment, why you should be aware of the “Dictionary attack”? 
7).
Symantec is the maker of which among the following popular antivirus software?
8).
What do we call a malicious computer program which pretends to be a useful application?
9).
Which of these are some of the Anti-virus softwares?
10).
What is Firewall?
11).
What do we call the attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content?
12).
What do we call the malicious computer programs that gains root or administrative access to the computer?
13).
What do we call an attack which overwhelms a system’s resources so that it cannot respond to service requests?
14).
Which of these is an XSS attack?
15).
What do we call a malware that blocks access to the victim’s data and threatens to publish or delete it unless money is paid?
16).
Which of these virus infects a software program and causes a series of actions to begin automatically when the program is opened?
17).
What do we call a malware computer program that replicates itself in order to spread to other computers?
18).
Which of these is a program is used to install viruses on computers?
19).
What do we call a malicious program that is appended to an application and is triggered by a specific event, such as a logical condition or a specific date and time?
20).
What is the name of the attack which happens when a malefactor executes a SQL query to the database via the input data from the client to server?
21).
What is the attack called where the hackers look for insecure websites and plant a malicious script into the sourcecode?
22).
What is the technique called as by which an attacker illicitly impersonates another machine by manipulating IP packets to gain unauthorized access?
23).
Which of these malicious programs collect information about users and sends the data to a remote user?
24).
What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature?
25).
What are the viruses that rewrite themselves completely each time they are to infect new executables, known as?
26).
What is Keylogging attack?
27).
What is CodeRed?
1. Which among the following is not a security / privacy risk?
[A] Spam
[B] Virus
[C] Hacking
[D] Phishing
2. Now a days Vishing has become a criminal practice of using social engineering over which of the following?
[A] Social networking sites
[B] Mobile Phones
[C] E-mails
[D] Cyber cafés
3. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
[A] Spam
[B] Hacking
[C] Phishing
[D] Vishing
4. Which among the following is the most common source of Viruses to the hard disk of your computer?
[A] Incoming Email
[B] Outgoing Email
[C] CD ROMs
[D] Websites
5. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
[A] Virtual keyboard
[B] Finger Touching
[C] Touch screen
[D] ShapeWriter
6. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?
[A] It is used to inject worms or viruses in the system
[B] It is used to determine a password
[C] It is used to access customer’s account by determining other details
[D] It is used for stealing info from the Credit Card
7. Symantec is the maker of which among the following popular antivirus software?
[A] Norton
[B] BitDefender
[C] Avast
[D] McAfee VirusScan
8. What do we call a malicious computer program which pretends to be a useful application?
[A] Worms
[B] Trojan horse
[C] Ransomware
[D] Keylogger
9. Which of these are some of the Anti-virus softwares?
[A] Avast Antivirus
[B] Panda Antivirus
[C] Comodo Antivirus
[D] All of the above
10. What is Firewall?
[A] A malware
[B] Type of Phishing attack
[C] Security system
[D] A DOS attack
Advertisement

Kindly help us to keep GKToday updated and error free. Use this form to report error or outdated information in questions. We shall rectify asap...