
Computer security focuses on protecting computer systems and their data from theft, damage, and unauthorized access. It involves a combination of hardware, software, and procedural safeguards.
As technology advances, ensuring computer security is vital for both individuals and organizations to mitigate risks and protect sensitive data.
1. Which of the following is NOT a type of malware?
A. Virus
B. Worm
C. Firewall
D. Trojan
Answer: C. Firewall
Explanation: A firewall is a security system used to monitor and control network traffic. The others are types of malicious software.
2. What does “phishing” aim to do?
A. Destroy data
B. Steal sensitive information
C. Encrypt files for ransom
D. Monitor network traffic
Answer: B. Steal sensitive information
Explanation: Phishing is a technique where attackers trick users into providing sensitive data, such as passwords or credit card information, often through fake websites or emails.
3. What is the primary purpose of a firewall?
A. Encrypt data
B. Detect intrusions
C. Control network traffic
D. Create backups
Answer: C. Control network traffic
Explanation: Firewalls act as a barrier to control incoming and outgoing network traffic based on security rules.
4. What does “two-factor authentication” (2FA) add to security?
A. Longer passwords
B. A second layer of verification
C. A backup of credentials
D. Biometric recognition
Answer: B. A second layer of verification
Explanation: 2FA requires a user to verify their identity using two methods, such as a password and a code sent to their phone.
5. What is the term for the process of encoding data to protect it from unauthorized access?
A. Hacking
B. Encryption
C. Decryption
D. Firewalling
Answer: B. Encryption
Explanation: Encryption secures data by converting it into an unreadable format, only accessible with the correct decryption key.
6. Which attack floods a network or server with excessive traffic?
A. Phishing
B. Ransomware
C. Denial-of-Service (DoS)
D. Spoofing
Answer: C. Denial-of-Service (DoS)
Explanation: A DoS attack overwhelms the target with traffic, rendering it unable to respond to legitimate requests.
7. What is a “zero-day vulnerability”?
A. An outdated software flaw
B. A discovered but unpatched security flaw
C. A fully patched software system
D. An attack that encrypts data
Answer: B. A discovered but unpatched security flaw
Explanation: Zero-day vulnerabilities are exploited by attackers before developers release a fix.
8. Which of the following best describes a “man-in-the-middle” attack?
A. Altering data during transmission
B. Sending unsolicited emails
C. Denying service to legitimate users
D. Installing spyware remotely
Answer: A. Altering data during transmission
Explanation: In a man-in-the-middle attack, the attacker intercepts and possibly alters communication between two parties.
9. What does VPN stand for?
A. Virtual Private Network
B. Virtual Personal Network
C. Verified Protected Network
D. Virtual Protected Node
Answer: A. Virtual Private Network
Explanation: A VPN encrypts internet connections, providing a secure tunnel between devices.
10. What is the primary goal of ransomware?
A. Monitor user activities
B. Steal passwords
C. Encrypt files for ransom
D. Delete system files
Answer: C. Encrypt files for ransom
Explanation: Ransomware encrypts a victim’s data and demands payment for the decryption key.
11. Which of these is an example of biometric authentication?
A. PIN
B. Password
C. Fingerprint scan
D. Security question
Answer: C. Fingerprint scan
Explanation: Biometrics use unique physical characteristics, like fingerprints or facial recognition, for authentication.
12. What does HTTPS indicate on a website?
A. The website is a government site
B. The site is secure and uses encryption
C. The website is hosted on a private server
D. The site is safe from all attacks
Answer: B. The site is secure and uses encryption
Explanation: HTTPS encrypts data between the user’s browser and the website, enhancing security.
13. Which type of malware disguises itself as legitimate software?
A. Virus
B. Worm
C. Trojan
D. Spyware
Answer: C. Trojan
Explanation: Trojans trick users into downloading malicious software by pretending to be legitimate.
14. What is the term for unauthorized access to computer systems or networks?
A. Phishing
B. Spoofing
C. Hacking
D. Encryption
Answer: C. Hacking
Explanation: Hacking involves gaining unauthorized access to systems or data.
15. Which of these is NOT a strong password practice?
A. Using a mix of characters
B. Avoiding dictionary words
C. Keeping the same password for multiple accounts
D. Regularly updating passwords
Answer: C. Keeping the same password for multiple accounts
Explanation: Reusing passwords across accounts increases the risk of compromise.
16. Which security concept ensures that data is not altered in transit?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Answer: B. Integrity
Explanation: Integrity ensures that data remains accurate and unaltered during transmission.
17. What is the primary function of an antivirus program?
A. Backing up data
B. Detecting and removing malicious software
C. Encrypting sensitive information
D. Monitoring network activity
Answer: B. Detecting and removing malicious software
Explanation: Antivirus programs scan systems for malware and remove threats.
18. What type of attack involves tricking users into revealing personal information?
A. Spoofing
B. Phishing
C. Sniffing
D. Botnet
Answer: B. Phishing
Explanation: Phishing attacks use deceptive techniques, often emails, to obtain personal information.
19. Which is a common sign of a compromised system?
A. Unusually fast performance
B. Unexpected pop-ups or ads
C. Reduced internet usage
D. Automatically closed applications
Answer: B. Unexpected pop-ups or ads
Explanation: Pop-ups and unusual ads are common indicators of malware infection.
20. What is the purpose of a security patch?
A. Improve software aesthetics
B. Enhance software functionality
C. Fix vulnerabilities in software
D. Increase the speed of applications
Answer: C. Fix vulnerabilities in software
Explanation: Security patches address and fix known vulnerabilities in software to prevent exploitation.
You may also like:- 20 Multiple Choice Questions on Website Security
- Top 20 Common Questions on Computer Security
- Top 20 Frequently Asked Network Security MCQs with Answers
- Top 10 Computer Fundamentals Questions and Answers
- Quiz Time – Testing Your Knowledge on Popular Computer Questions
- 15 Important Questions Related to Computer
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11