Current Affairs PDF

Computer Quiz : Internet & Computer Security Set – 10

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.

  1. __________ is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities over the telephone.
    A. Smishing
    B. Phishing
    C. Pharming
    D. Vishing
    D. Vishing

  2. Vishing is also known as _________
    A. VoIP Phishing
    B. Voice Phishing
    C. Voice Pharming
    D. Both (A) and (B)
    D. Both (A) and (B)

  3. _________ is another scam where a fraudster installs malicious code on a personal computer or server.
    A. Smishing
    B. Phishing
    C. Pharming
    D. Vishing
    C. Pharming

  4. Which of the following is a security attack through SMS in which the user is tricked into downloading a Trojan horse or other malware onto his mobile.
    A. Smishing
    B. Phishing
    C. Pharming
    D. Vishing
    A. Smishing

  5. Smishing is also known as _________
    A. SMS Phishing
    B. SMS Vishing
    C. SMS Pharming
    D. Both (A) and (B)
    A. SMS Phishing

  6. ____________is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email.
    A. Smishing
    B. Phishing
    C. Pharming
    D. Vishing
    B. Phishing

  7. Collecting personal information and effectively posing as another individual is known as the crime of _________
    A. Smishing
    B. Phishing
    C. hacking
    D. identity theft
    D. identity theft

  8. The creation of Internet Protocol(IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computer system is called _____
    A. Smishing
    B. Spoofing
    C. hacking
    D. identity theft
    B. Spoofing

  9. Ethical hackers who use their skill to secure the integrity of computer systems of networks is called ________
    A. Black Hat
    B. Red Hat
    C. White Hat
    D. Green Hat
    C. White Hat

  10. Spam Over Instant messenger is called_____
    A. SPIT
    B. SPIM
    C. Both (A) and (B)
    D. None of the Above
    B. SPIM