Computer Quiz – 87

COMPUTER QUIZ

1. A vulnerability scanner is?
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Click here to View Answer
Answer b) a tool used to quickly check computers on a network for known weaknesses.

2. A packet sniffer is?
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Click here to View Answer
Answer c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

3. Diskette is a?
a) A low-cost, thin flexible magnetic disk storage device
b) High volume storage device
c) Primary storage device
d) None of these

Click here to View Answer
Answer a) A low-cost, thin flexible magnetic disk storage device

4. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted?
a) White hat
b) Grey hat
c) Blue hat
d) None of these

Click here to View Answer
Answer b) Grey hat

5. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed?
a) White hat
b) Grey hat
c) Blue hat
d) None of these

Click here to View Answer
Answer c) Blue hat

6. Process of finding/ correcting program errors is?
a) Bugs
b) Debugging
c) Hacking
d) Cracking

Click here to View Answer
Answer b) Debugging

7. Diagnostic routines is a?
a) Programs used to print error messages
b) Indicates system problems and improper program instructions.
c) Both A & B are true
d) None of these

Click here to View Answer
Answer c) Both A & B are true

8. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies ofitself on one system: it propagates through computer networks?
a) Keylogger
b) Worm
c) Cracker
d) None of these

Click here to View Answer
Answer b) Worm

9. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker

Click here to View Answer
Answer a) Trojan horses

10. The time period during which a computer is malfunctioning or not operating correctly due to machine failures is referred as?
a) Downtime
b) Uptime
c) Runtime
d) None of these

Click here to View Answer
Answer a) Downtime