Computer Fundamentals

Computer Security — Practice MCQs for CCAT

20 Questions Section A: Fundamentals Computer Fundamentals

Practice 20 Computer Security multiple-choice questions designed for CDAC CCAT exam preparation. Click "Show Answer" to reveal the correct option with detailed explanation.

Q1.
A computer virus is:
AHardware malfunction
BMalicious software
CSystem update
DNetwork protocol
Show Answer & Explanation

Correct Answer: B — Malicious software

A computer virus is malicious software that can replicate and spread to other computers.

Q2.
Firewall is used to:
AIncrease speed
BStore data
CProtect from unauthorized access
DConnect to internet
Show Answer & Explanation

Correct Answer: C — Protect from unauthorized access

A firewall monitors and controls network traffic to protect from unauthorized access.

Q3.
Phishing is:
AA game
BFraudulent attempt to obtain sensitive data
CAntivirus software
DNetwork cable
Show Answer & Explanation

Correct Answer: B — Fraudulent attempt to obtain sensitive data

Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

Q4.
Encryption is used to:
ASpeed up computer
BProtect data
CDelete files
DFormat disk
Show Answer & Explanation

Correct Answer: B — Protect data

Encryption converts data into a coded form to protect it from unauthorized access.

Q5.
A Trojan horse is:
AAntivirus
BMalware disguised as legitimate software
CFirewall
DBrowser
Show Answer & Explanation

Correct Answer: B — Malware disguised as legitimate software

A Trojan horse is malware that disguises itself as legitimate software to trick users.

Q6.
Spyware is designed to:
AProtect computer
BSecretly collect user information
CSpeed up internet
DUpdate software
Show Answer & Explanation

Correct Answer: B — Secretly collect user information

Spyware secretly monitors and collects user information without consent.

Q7.
What is a strong password?
Apassword123
BYour name
CMix of letters, numbers, symbols
D12345678
Show Answer & Explanation

Correct Answer: C — Mix of letters, numbers, symbols

A strong password contains a mix of uppercase, lowercase, numbers, and special symbols.

Q8.
Two-factor authentication uses:
AOnly password
BTwo different verification methods
COnly fingerprint
DOnly OTP
Show Answer & Explanation

Correct Answer: B — Two different verification methods

Two-factor authentication requires two different methods to verify identity.

Q9.
Malware stands for:
AMalicious software
BMale software
CMajor software
DMail software
Show Answer & Explanation

Correct Answer: A — Malicious software

Malware is short for malicious software - any software designed to harm.

Q10.
SSL is used for:
AFile compression
BSecure web communication
CEmail sending
DFile transfer
Show Answer & Explanation

Correct Answer: B — Secure web communication

SSL (Secure Sockets Layer) provides secure encrypted communication over the internet.

Q11.
What is a DDoS attack?
AData theft
BOverwhelming a server with traffic
CPassword cracking
DEmail spoofing
Show Answer & Explanation

Correct Answer: B — Overwhelming a server with traffic

DDoS (Distributed Denial of Service) floods a server with traffic to make it unavailable.

Q12.
Ransomware is:
AAntivirus software
BMalware that encrypts files and demands payment
CFirewall
DBackup software
Show Answer & Explanation

Correct Answer: B — Malware that encrypts files and demands payment

Ransomware encrypts user files and demands payment for the decryption key.

Q13.
What is social engineering in security?
ABuilding social networks
BManipulating people to reveal confidential information
CNetwork engineering
DSoftware development
Show Answer & Explanation

Correct Answer: B — Manipulating people to reveal confidential information

Social engineering manipulates people into revealing confidential information.

Q14.
A keylogger is:
AKeyboard type
BSoftware that records keystrokes
CEncryption tool
DPassword manager
Show Answer & Explanation

Correct Answer: B — Software that records keystrokes

A keylogger secretly records keyboard inputs to capture passwords and sensitive data.

Q15.
What is biometric authentication?
APassword-based login
BUsing physical characteristics for verification
CToken-based access
DPIN verification
Show Answer & Explanation

Correct Answer: B — Using physical characteristics for verification

Biometric authentication uses physical characteristics like fingerprint or retina for verification.

Q16.
VPN stands for:
AVirtual Private Network
BVery Private Network
CVirtual Public Network
DVerified Private Network
Show Answer & Explanation

Correct Answer: A — Virtual Private Network

VPN stands for Virtual Private Network, providing secure internet connections.

Q17.
What is a zero-day vulnerability?
AFixed vulnerability
BUnknown vulnerability exploited before patch
COld vulnerability
DMinor security issue
Show Answer & Explanation

Correct Answer: B — Unknown vulnerability exploited before patch

Zero-day vulnerability is a security flaw exploited before developers can create a patch.

Q18.
HTTPS uses which port by default?
A80
B21
C443
D25
Show Answer & Explanation

Correct Answer: C — 443

HTTPS uses port 443 by default for secure web communication.

Q19.
What is a rootkit?
ASystem utility
BMalware that hides its presence and provides unauthorized access
CAntivirus tool
DBackup software
Show Answer & Explanation

Correct Answer: B — Malware that hides its presence and provides unauthorized access

A rootkit is malware designed to hide its presence while providing unauthorized access.

Q20.
Digital signature is used for:
ACompressing files
BVerifying authenticity and integrity
CSpeeding up downloads
DCreating backups
Show Answer & Explanation

Correct Answer: B — Verifying authenticity and integrity

Digital signatures verify the authenticity and integrity of digital documents.