Practice 20 Computer Security multiple-choice questions designed for CDAC CCAT exam preparation. Click "Show Answer" to reveal the correct option with detailed explanation.
Show Answer & Explanation
Correct Answer: B — Malicious software
A computer virus is malicious software that can replicate and spread to other computers.
Show Answer & Explanation
Correct Answer: C — Protect from unauthorized access
A firewall monitors and controls network traffic to protect from unauthorized access.
Show Answer & Explanation
Correct Answer: B — Fraudulent attempt to obtain sensitive data
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Show Answer & Explanation
Correct Answer: B — Protect data
Encryption converts data into a coded form to protect it from unauthorized access.
Show Answer & Explanation
Correct Answer: B — Malware disguised as legitimate software
A Trojan horse is malware that disguises itself as legitimate software to trick users.
Show Answer & Explanation
Correct Answer: B — Secretly collect user information
Spyware secretly monitors and collects user information without consent.
Show Answer & Explanation
Correct Answer: C — Mix of letters, numbers, symbols
A strong password contains a mix of uppercase, lowercase, numbers, and special symbols.
Show Answer & Explanation
Correct Answer: B — Two different verification methods
Two-factor authentication requires two different methods to verify identity.
Show Answer & Explanation
Correct Answer: A — Malicious software
Malware is short for malicious software - any software designed to harm.
Show Answer & Explanation
Correct Answer: B — Secure web communication
SSL (Secure Sockets Layer) provides secure encrypted communication over the internet.
Show Answer & Explanation
Correct Answer: B — Overwhelming a server with traffic
DDoS (Distributed Denial of Service) floods a server with traffic to make it unavailable.
Show Answer & Explanation
Correct Answer: B — Malware that encrypts files and demands payment
Ransomware encrypts user files and demands payment for the decryption key.
Show Answer & Explanation
Correct Answer: B — Manipulating people to reveal confidential information
Social engineering manipulates people into revealing confidential information.
Show Answer & Explanation
Correct Answer: B — Software that records keystrokes
A keylogger secretly records keyboard inputs to capture passwords and sensitive data.
Show Answer & Explanation
Correct Answer: B — Using physical characteristics for verification
Biometric authentication uses physical characteristics like fingerprint or retina for verification.
Show Answer & Explanation
Correct Answer: A — Virtual Private Network
VPN stands for Virtual Private Network, providing secure internet connections.
Show Answer & Explanation
Correct Answer: B — Unknown vulnerability exploited before patch
Zero-day vulnerability is a security flaw exploited before developers can create a patch.
Show Answer & Explanation
Correct Answer: C — 443
HTTPS uses port 443 by default for secure web communication.
Show Answer & Explanation
Correct Answer: B — Malware that hides its presence and provides unauthorized access
A rootkit is malware designed to hide its presence while providing unauthorized access.
Show Answer & Explanation
Correct Answer: B — Verifying authenticity and integrity
Digital signatures verify the authenticity and integrity of digital documents.