Computer Security Quiz

1. A vulnerability scanner is _______________ .
2. A packet sniffer is __________________ .
3. These hacker breaks security for altruistic or at least non-malicious reasons.
4. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
5. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.
6. It is a software program designed to record (‘log’) every keystroke on the machine on which it runs.
7. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
8. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.
9. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
10. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
11. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
12. Rootkit is ______________ .
13. Spoofing attack is ____________ .
14. Security exploit is _____________ .
15. White hat is __________ .
16. Grey hat is _____________ .
17. Blue hat is ______________ .
18. Black hat is _____________ .
19. Script kiddie is ______________ .
20. Hacktivism is __________________ .
21. It is a prepared application that takes advantage of a known weakness.
22. It is a tool used to quickly check computers on a network for known weaknesses.
23. It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
24. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Computer Security Quiz
You got {{userScore}} out of {{maxScore}} correct
{{title}}
{{image}}
{{content}}

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *