88% found this document useful (48 votes)
56K views

Solved MCQ of Computer Security and Network Security

The document contains a set of multiple choice questions about computer security concepts. It asks questions about integrity meaning ensuring only authorized parties can modify systems; confidentiality meaning only authorized parties can access information; and common types of threats. It also asks about logic bombs, trojan horses, worms, viruses, how they spread, and different types of viruses like stealth, polymorphic, and macro viruses.

Uploaded by

nooti
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
88% found this document useful (48 votes)
56K views

Solved MCQ of Computer Security and Network Security

The document contains a set of multiple choice questions about computer security concepts. It asks questions about integrity meaning ensuring only authorized parties can modify systems; confidentiality meaning only authorized parties can access information; and common types of threats. It also asks about logic bombs, trojan horses, worms, viruses, how they spread, and different types of viruses like stealth, polymorphic, and macro viruses.

Uploaded by

nooti
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Solved MCQ of Computer Security set -1

1. In computer security, . means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability ) Authenticity !. In computer security, .. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability ) Authenticity ". #he type of threats on the security of a computer system or net$or% are .. i) Interruption ii) Interception iii) &odification iv) Creation v) 'abrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only ) All i, ii, iii, iv and v (. )hich of the follo$ing is independent malicious program that need not any host program* A) #rap doors B) #ro+an horse C) ,irus ) )orm -. #he .. is code that recognizes some special se.uence of input or is triggered by being run from a certain user I of by unli%ely se.uence of events. A) #rap doors B) #ro+an horse C) /ogic Bomb ) ,irus 0. #he .. is code embedded in some legitimate program that is set to 1e2plode3 $hen certain conditions are met. A) #rap doors B) #ro+an horse C) /ogic Bomb ) ,irus 4. )hich of the follo$ing malicious program do not replicate automatically* A) #ro+an 5orse

B) ,irus C) )orm ) 6ombie 7. programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) 6ombie B) )orm C) #ro+an 5orses ) /ogic Bomb 8. 9tate $hether true of false. i) A $orm mails a copy of itself to other systems. ii) A $orm e2ecutes a copy of itself on another system. A) #rue, 'alse B) 'alse, #rue C) #rue, #rue ) 'alse, 'alse 1:. A .. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, $hich can go on to infect other programs. A) )orm B) ,irus C) 6ombie ) #rap doors Answers:

1. 2. 3. 4. 5.

B) Integrity A) Confidentiality C) i, ii, iii and v only D) Worm A) Trap door

C) !ogi" Bom# A) Tro$an %or e C) Tro$an %or e C) Tr&e, Tr&e 1'. B) (ir&

MCQ of Computer Security with answer set 2


1. .. are used in denial of service attac%s, typically against targeted $eb sites. A) )orm B) 6ombie C) ,irus ) #ro+an horse !. 9elect the correct order for the different phases of virus e2ecution. i) ;ropagation phase ii) ormant phase iii) <2ecution phase iv) #riggering phase A) i, ii, iii, and iv B) i, iii, ii and iv C) ii, i, iv an iii

) ii, iii, iv and i ". A attaches itself to e2ecutable files and replicates, $hen the infected program is e2ecuted, by finding other e2ecutable files to infect. A) 9tealth virus B) ;olymorphic ,irus C) ;arasitic ,irus ) &acro ,irus (. .. is a form of virus e2plicitly designed to hide itself from detection by antivirus soft$are. A) 9tealth virus B) ;olymorphic ,irus C) ;arasitic ,irus ) &acro ,irus -. A .. creates copies during replication that are functionally e.uivalent but have distinctly different bit patterns. A) Boot 9ector ,irus B) ;olymorphic ,irus C) ;arasitic ,irus ) &acro ,irus 0. A portion of the ;olymorphic virus, generally called a .. , creates, a random encryption, %ey to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine ) polymorphic engine 4. 9tate $hether the follo$ing statement is true. i) A macro virus is platform independent. ii) &acro viruses infect documents, not e2ecutable portions of code. A) i=only B) ii=only C) Both i and ii ) >on i and ii 7. #he type?s) of auto e2ecuting macros, in &icrosoft $ord is@are A) Auto e2ecute B) Auto macro C) Command macro ) All of the above 8. In .., the virus places an identical copy of itself into other programs or into certain system areas on the dis%. A) ormant phase B) ;ropagation phase C) #riggering phase

) <2ecution phase 1:. A is a program that secretly ta%es over another Internet=attached computer and then uses that computer to launch attac%s. A) )orm B) 6ombie C) ,irus ) #rap doors Answers:

1. 2. 3. 4. 5.

B) )om#ie C) ii, i, iv an iii C) *ara iti" (ir& A) +tealt, vir& B) *olymorp,i" (ir&

B) m&tation engine C) Bot, i and ii D) All of t,e a#ove B) *ropagation p,a e 1'. B) )om#ie

You might also like