MCQ on Computer Viruses and Security – Computer GK

Useful and informative MCQ on Computer Viruses and Security – Computer GK that include topics like Threats to Computer Security – Computer Viruses, Worms, Trojan Horses, Spyware, Adware, Spamming, PC Intrusion, Eavesdropping, Phishing and Pharming, Solution to Computer Security Threats, etc.

These MCQ on Computer Viruses and Security – Computer GK are very helpful for competitive exams such as CPCT, GATE, IES/ESE, IBPS PO, IBPS Clerk, SBI PO, SBI Clerk, RBI, SEBI, LIC, NICL, BCA, B.Sc. IT, DCA, SSC, RRB, NIELIT CCC, CTET, UDC NET, CUET, MCA, PGDCA, MCS, TET, State Police, BPO, etc.

These MCQ on Computer Viruses and Security – Computer GK have correct answers and brief explanations of each question for better understanding.

Q21. What is a man-in-the-middle (MITM) attack?
a) An attack in which an attacker intercepts and alters communications between two parties
b) A type of computer virus that spreads through email attachments
c) A type of malware that records a user’s keystrokes
d) A technique used by attackers to redirect users to fake websites

Show Answer

Correct Answer: a) An attack in which an attacker intercepts and alters communications between two parties
Explanation: A man-in-the-middle (MITM) attack is a type of cyberattack in which an attacker intercepts and alters communications between two parties, often without their knowledge. MITM attacks can be used to steal sensitive information, such as login credentials or financial data, or to manipulate the content of messages being exchanged. To protect against MITM attacks, users should use encrypted communication channels, such as HTTPS or VPNs, and be cautious when connecting to public Wi-Fi networks.

Q22. What is a backdoor?
a) A hidden method of bypassing security controls to gain unauthorized access to a system
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) A hidden method of bypassing security controls to gain unauthorized access to a system
Explanation: A backdoor is a hidden method of bypassing security controls to gain unauthorized access to a system. Backdoors can be intentionally created by developers for maintenance or debugging purposes, or they can be introduced by attackers through malware or other means. Once a backdoor is in place, it can be used to access the system, steal sensitive information, or carry out other malicious activities. To protect against backdoors, users should keep their software and operating systems up to date, use strong passwords and multi-factor authentication, and employ security software that can detect and block unauthorized access attempts.

Q23. What is social engineering?
a) The use of deception and manipulation to trick people into revealing sensitive information or performing actions that benefit the attacker
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) The use of deception and manipulation to trick people into revealing sensitive information or performing actions that benefit the attacker
Explanation: Social engineering is the use of deception and manipulation to trick people into revealing sensitive information or performing actions that benefit the attacker. Social engineering attacks often rely on the attacker’s ability to gain the trust of the target or exploit their emotions, such as fear, curiosity, or greed. Common social engineering techniques include phishing, pretexting, and baiting. To protect against social engineering attacks, users should be cautious when sharing personal information, verify the identity of the person or organization they are communicating with, and be aware of common tactics used by attackers.

Q24. What is a brute force attack?
a) An attack that attempts to guess a password or encryption key through trial and error
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An attack that attempts to guess a password or encryption key through trial and error
Explanation: A brute force attack is a type of cyberattack that attempts to guess a password or encryption key through trial and error. Brute force attacks involve systematically trying every possible combination of characters until the correct password or key is found. These attacks can be time-consuming and resource-intensive, but they can be effective if the target uses weak or easily guessable passwords. To protect against brute force attacks, users should use strong, complex passwords and enable multi-factor authentication when possible.

Q25. What is a buffer overflow attack?
a) An attack that exploits a vulnerability in a program’s memory management
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An attack that exploits a vulnerability in a program’s memory management
Explanation: A buffer overflow attack is a type of cyberattack that exploits a vulnerability in a program’s memory management. Buffer overflow attacks occur when an attacker sends more data to a program than it can handle, causing the excess data to overwrite adjacent memory locations. This can lead to unpredictable behavior, crashes, or even the execution of malicious code. To protect against buffer overflow attacks, developers should use secure coding practices, such as input validation and bounds checking, and users should keep their software and operating systems up to date.

Q26. What is a port scan?
a) A technique used by attackers to identify open network ports on a target system
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) A technique used by attackers to identify open network ports on a target system
Explanation: A port scan is a technique used by attackers to identify open network ports on a target system. By scanning a range of port numbers, an attacker can determine which services are running on the target system and potentially exploit any vulnerabilities associated with those services. Port scans can be a precursor to more targeted attacks, as they provide valuable information about the target’s network configuration and potential attack vectors. To protect against port scans, users should use firewalls to block unnecessary ports and keep their software and operating systems up to date.

Q27. What is a SYN flood attack?
a) An attack that overwhelms a server by sending a large number of SYN packets
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An attack that overwhelms a server by sending a large number of SYN packets
Explanation: A SYN flood attack is a type of cyberattack that overwhelms a server by sending a large number of SYN (synchronize) packets, which are used to initiate a TCP connection. The server responds to each SYN packet with a SYN-ACK (synchronize-acknowledge) packet, but the attacker never completes the connection by sending the final ACK (acknowledge) packet. This causes the server to allocate resources for each incomplete connection, eventually leading to resource exhaustion and a denial of service. To defend against SYN flood attacks, organizations can use various security measures, such as rate limiting, SYN cookies, or specialized hardware or software solutions.

Q28. What is a cross-site scripting (XSS) attack?
a) An attack that injects malicious code into a website, causing it to be executed by the victim’s browser
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An attack that injects malicious code into a website, causing it to be executed by the victim’s browser
Explanation: A cross-site scripting (XSS) attack is a type of cyberattack that injects malicious code into a website, causing it to be executed by the victim’s browser. XSS attacks can be used to steal sensitive information, such as login credentials or personal data, or to perform actions on the victim’s behalf without their knowledge or consent. To protect against XSS attacks, web developers should use secure coding practices, such as input validation and output encoding, and users should keep their browsers and plugins up to date.

Q29. What is a SQL injection attack?
a) An attack that exploits vulnerabilities in a database-driven application by injecting malicious SQL code
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An attack that exploits vulnerabilities in a database-driven application by injecting malicious SQL code
Explanation: A SQL injection attack is a type of cyberattack that exploits vulnerabilities in a database-driven application by injecting malicious SQL code. SQL injection attacks can be used to gain unauthorized access to sensitive data, modify or delete records, or execute arbitrary commands on the target system. To protect against SQL injection attacks, developers should use secure coding practices, such as input validation, parameterized queries, and stored procedures, and users should keep their software and operating systems up to date.

Q30. What is a drive-by download?
a) An unintentional download of malware that occurs when a user visits a compromised website
b) A type of computer virus that spreads through email attachments
c) A type of firewall that blocks access to certain websites
d) A type of malware that records a user’s keystrokes

Show Answer

Correct Answer: a) An unintentional download of malware that occurs when a user visits a compromised website
Explanation: A drive-by download is an unintentional download of malware that occurs when a user visits a compromised website. Drive-by downloads can occur without any user interaction, often exploiting vulnerabilities in the user’s browser or plugins to install malware on their system. To protect against drive-by downloads, users should keep their browsers and plugins up to date, use security software that can detect and block malicious websites, and be cautious when visiting unfamiliar websites.

error: Content is protected !!
Scroll to Top