Computer Security – Various Attacks and Malware GK MCQs With Answer & Explanation in English

Computer security is an essential aspect of the modern digital world, safeguarding systems and data from various threats. In this article, Computer Security – Various Attacks and Malware GK MCQs With Answer & Explanation in English, you will explore a comprehensive collection of multiple-choice questions designed to enhance your knowledge of cyberattacks, malware types, and security measures.

With detailed explanations accompanying each answer, this guide is perfect for students, professionals, and enthusiasts looking to deepen their understanding of computer security.

1. Which among the following is not a security or privacy risk?

  1. Spam
  2. Virus
  3. Hacking
  4. Phishing

Show Answer

Answer: Spam

Spam, in the context of digital communications, refers to unsolicited and often unwanted messages or content sent in bulk to a large number of recipients. These messages can take various forms, such as emails, instant messages, or comments on websites. While spam is primarily known for its nuisance factor, as it clutters inboxes and disrupts online experiences, it is generally not considered a direct security or privacy risk. However, some spam may contain malicious links or content, which can pose a security threat if users interact with it. To mitigate the impact of spam, many email services and websites employ filtering techniques to divert spam messages away from users’ primary inboxes.

2. Nowadays, Vishing has become a criminal practice of using social engineering over which of the following?

  1. Social networking sites
  2. Mobile Phones
  3. E-mails
  4. Cyber cafés

Show Answer

Answer: Mobile Phones

Vishing, short for “voice phishing,” is a form of social engineering attack that takes place over the telephone system. In vishing attacks, criminals impersonate legitimate entities, such as banks, government agencies, or businesses, in an attempt to manipulate individuals into revealing sensitive information, including personal and financial data. Vishing is particularly relevant to mobile phone users who are targeted via phone calls, voice messages, or SMS messages.

3. When an unidentified or unknown person/firm sends you a trustworthy or lucrative email requesting sensitive banking and online payment information, it is a case of:

  1. Spam
  2. Hacking
  3. Phishing
  4. Vishing

Show Answer

Answer: Phishing

Phishing is a type of cybercrime that involves deceptive email communications. Attackers send fraudulent emails that impersonate legitimate organizations or entities, such as banks, social media platforms, or government agencies. These emails typically contain convincing messages or requests, aiming to deceive recipients into taking specific actions. The primary goal of phishing attacks is to trick individuals into providing sensitive information like login credentials, credit card numbers, or personal identification details.

4. Which among the following is the most common source of viruses to the hard disk of your computer?

  1. Incoming Email
  2. Outgoing Email
  3. CD ROMS
  4. Websites

Show Answer

Answer: Incoming Email

Viruses can be transmitted to a computer’s hard disk through various means, with incoming emails being one of the common sources. Attackers often use email attachments to distribute malicious software or malware, which can infect a recipient’s computer upon opening the attachment. These viruses can cause a wide range of damage, from data loss to compromising the security of the affected system.

5. Most internet banking sites provide which of the following features to reduce the risk of keystroke logging for password entry?

  1. Virtual keyboard
  2. Finger Touching
  3. Touch screen
  4. Shape Writer

Show Answer

Answer: Virtual keyboard

Virtual keyboards are a security measure often employed by internet banking sites and other platforms to reduce the risk of keystroke logging, a technique used by attackers to record users’ keystrokes and capture sensitive information such as passwords. Virtual keyboards present an on-screen representation of a keyboard, and users input their login credentials and other sensitive data by clicking on the virtual keys using a mouse or touchscreen. This method can be more secure than typing on a physical keyboard when a computer is potentially compromised by malware designed to capture keystrokes.

6. As a person working in the internet banking environment, why should you be aware of “Dictionary attack”?

  1. It is used to inject worms or viruses in the system
  2. It is used to determine a password
  3. It is used to access customer’s accounts by determining other details
  4. It is used for stealing info from the Credit Card

Show Answer

Answer: It is used to determine a password

A dictionary attack is a common method used by attackers to guess passwords systematically. In this type of attack, the attacker tries every word in a dictionary or a list of commonly used passwords, hoping to find the correct password for an account. This underscores the importance of choosing strong and unique passwords, incorporating a combination of letters, numbers, and symbols to enhance password security.

7. Symantec is the maker of which popular antivirus software?

  1. Norton
  2. BitDefender
  3. Avast
  4. McAfee VirusScan

Show Answer

Answer: Norton

Symantec, now known as NortonLifeLock, is a well-known company that develops and provides antivirus software, including the popular Norton antivirus suite. Antivirus software is designed to protect computer systems from various forms of malware, viruses, and security threats. Norton antivirus products offer real-time protection, malware detection, and other security features to help users safeguard their devices and data from cyber threats.

8. What do we call a malicious computer program that pretends to be a useful application?

  1. Worms
  2. Trojan horse
  3. Ransomware
  4. Keylogger

Show Answer

Answer: Trojan horse

A Trojan horse, often referred to simply as a “Trojan,” is a form of malicious software that disguises itself as a legitimate and useful application. While a Trojan may appear harmless or even beneficial, it carries out harmful actions once it gains access to a computer or device. These actions can include stealing sensitive information, granting unauthorized access to attackers, or causing damage to the system. Trojans are often distributed through deceptive means, such as email attachments or software downloads.

9. What do we call the attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content?

  1. Eavesdropping
  2. Phishing
  3. Denial of Service
  4. Spamming

Show Answer

Answer: Eavesdropping

Eavesdropping, in the context of network security, refers to the unauthorized interception and monitoring of data transmissions over a network. Attackers capture and read the content of small data packets as they are transmitted between computers or devices on the network. This activity can lead to the exposure of sensitive information, including usernames, passwords, or confidential data.

10. What do we call the malicious computer programs that gain root or administrative access to the computer?

  1. Antivirus
  2. Spamware
  3. Rootkits
  4. Backdoors

Show Answer

Answer: Rootkits

Rootkits are a category of malicious software that are designed to gain privileged and often hidden access to a computer system. These programs aim to operate discreetly and evade detection while giving attackers control over the compromised system. Rootkits can provide unauthorized access, enable remote control, and serve as a platform for other forms of malware to run. Detecting and removing rootkits can be challenging due to their ability to conceal their presence on the system.

Latest Web Stories

Rohit Puri

Rohit Puri is an experienced educator and passionate advocate for knowledge dissemination in India. With a strong background in education, he has dedicated himself to empowering learners through well-researched and insightful content. As the author of engaging blogs on GK Scoop, Rohit focuses on general knowledge, current affairs MCQs, and essential educational topics relevant to the Indian context. His commitment to fostering a deeper understanding of critical issues makes him a trusted resource for students and educators alike. When he’s not writing, Rohit enjoys exploring new ways to enhance learning experiences and inspire curiosity in the classroom.

Leave a Reply

Your email address will not be published. Required fields are marked *

Press ESC to close

Sunita Williams Stuck in Space for 8 Months After Spacecraft Failure! Central Govt Employees Set for 3-4% DA Hike Soon Will Asteroid 2024 RN16 Hit Earth Today? Pratham Singh: Rising Cricket Star and IPL Sensation NFL Week 1 Schedule: Key Games and Kickoff Times