0% found this document useful (0 votes)
14 views8 pages

Ot S6 PKBL KZW NPa 8 E

The document is a collection of 130 practice questions related to computer security, covering theory, technical terms, multiple choice, and true/false questions. It addresses key concepts such as hardware and software security, the importance of backups, password policies, and various security measures. The content is aimed at helping students prepare for examinations in computer security.

Uploaded by

shyam nepali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views8 pages

Ot S6 PKBL KZW NPa 8 E

The document is a collection of 130 practice questions related to computer security, covering theory, technical terms, multiple choice, and true/false questions. It addresses key concepts such as hardware and software security, the importance of backups, password policies, and various security measures. The content is aimed at helping students prepare for examinations in computer security.

Uploaded by

shyam nepali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections

Computer Security Practice Questions Collections 2074

Computer Security
130 Questions Collections
Deepak Shrestha

74

1 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections

15 Theory Questions
1. What is computer security? List the types of computer security?
2. What is hardware security? List four hardware security measures.
3. What is software security? List four software security measures.
4. What is power regulator device? List any four power regulator device.
5. What is voltage regulator? List any two voltage regulator device.
6. What is UPS? Write down the importance of UPS.
7. What is scan disk?
8. What is backup? Why backup is vital in computer security system?
9. What is password? Why is password used in computer?
10. What is password policy? What are the things to be considered while keeping password?
11. How can software help to prevent data loss?
12. What should be done to protect the system from unauthorized access?
13. Differentiate between fragmentation and defragmentation.
14. List any four precautions to safeguard your computer system.
15. What is the objective of computer security? Write any four possible threats to computer security.

1. What is computer security?


Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to
accidental or intentional harm is known as computer security.

2. What are the main objectives of computer security?


Ans: The main objectives of computer security involve ensuring confidentiality, integrity, and availability of assets or
information.

3. What is hardware security?


Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intention
is known as hardware security.

4. List some of the hardware security measures.


Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft

5. What is software security?


Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called
software security.

6. List some of the software security measures.


Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password

7. What is voltage regulator device? Give example.


Ans: A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage level.

2 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections
E.g.: UPS, Spike guard, Volt guard, etc.

8. Why is power protection device needed in a computer system?


Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data
loss.

9. What is UPS?
Ans: A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It
provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation.

10. What is password?


Ans: A password is a secret word or phrase that gives a user access to a particular program or system.

11. What should be done to protect the system form unauthorized access?
Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the
system. A password should be difficult to guess and determine and should be changed regularly and memorized.

12. What is backup?


Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.

13. Why is backup vital to computer system?


Ans: Backup is essential to computer security system to save the important data and programs from accidental and intentional
harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or
damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.

14. How can software prevent data loss?


Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.

15. What is scan disk?


Ans: Scan disk is a process which involves in maintaining the disk files and folders, bad sectors, lost clusters, lost chains and
other errors of the specific disk and it can fix them if it is possible.

16. What is defragmentation?


Ans: The process of re-writing parts of a file to continuous sector on a hard disk to increase the speed of access and retrieval.

17. What is fragmentation?


Ans: The scattering of the parts of the same disk file over different location is called fragmentation.

18. What is password policy?


Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them
properly is called password policy.

19. Write any four criteria for a strong password.


Ans: Any four criteria for strong password are:
 Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
 Do not keep word as password that is currently popular.
 Keep a password with mixture of alphabet and numbers which is difficult to guess.
 Keep changing your password regularly.

20. Write down any five possible threats to computer security?


Ans: five possible threats to computer security are:
 Human error
3 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections
 Computer crime
 Natural disasters
 War and terrorist activity
 Hardware failure

25 Technical Terms
1. The process of preventing and detecting unauthorized use of your computer.
2. The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware
devices and data.
3. Security mechanism implemented on the basis of hardware.
4. The protection of the components of a computer system.
5. The securing data and programs from being lost or damaged due to accidental or intentional harm.
6. A secret word that gives a user access to a particular program and system.
7. A copy of file, which is used in the event of original file being corrupted.
8. A spare copy of important program and documents.
9. The scattering of the parts of the same disk file over different locations.
10. The process of rearranging the fragmented files in the contiguous locations on the disks.
11. A device that protects computer system from the fluctuation of electric voltage.
12. A program that checks a condition of hard disk.
13. A disk tool which helps to fix errors in the disk and also remove bad sectors.
14. A television transmitted to the particular audience at specific location via coaxial cables, telephone wires,
fiber-optics strands, microwave radio systems, or communications satellites, as compared to open-circuit
(broadcast) television intended for the general public.
15. The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
16. A device that protects your PC against power surges and spikes.
17. A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and
load current.
18. An electrical device that provides “clean” AC power to sensitive electrical equipment.
19. A device which provides continuous power to the computer equipment and protects them from power surges
and voltage fluctuations.
20. An electrical regulator designed to automatically maintains a constant voltage level.
21. The method applied to increase the life of computers and its assets.
22. An electric device that supply steady voltage to the appliance.
23. The power regulating device this supplies constant power to the computer from its backup system
24. A battery supported power unit between and external power source and a computer system which supplies
clean and continuous power even during power failures.
25. A device that allows your computer to keep running for at least a short time when the primary power sources
is lost.

Answers:
1. Computer Security 2. Computer Security 3. Hardware Security 4. Hardware 5. Software Security
Security
6. Password 7. Backup 8. Backup 9. Fragmentation 10. Defragmentation
11. Volt Guard 12. Scan Disk 13. Scan Disk 14. CCTV 15. CCTV
16. Surge Suppressor 17. Voltage 18. Power Conditioner 19. UPS 20. Voltage
Regulator Device Regulator
21.Regular 22. Volt Guard 23. UPS 24.UPS 25. UPS
Maintenance

30 Multiple Choice Questions


1. The term computer security refers to:
Use of antivirus Protection of software Protection to a computer system Use of firewall

4 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections
2. An important counter measure against data corruption or loss.
Password policy Defragmentation Scan disk Backup system
3. Which is not the power protection device?
UPS Spike Guard Volt Guard Scan disk
4. _______ protects the machine and peripheral devices from being damage.
Information security Hardware Security Software SecurityNone of them
5. To prevent the loss of data during power failures, we use:
Encryption program Surge protector Firewall UPS
6. _____ are used to avoid access for unauthorized users.
Logins Passwords Encryption Lock and key
7. Scan disk is used for
Removing virus Removing bad clusters Backup data All of above
8. _____________ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security ii) Hardware security iii) Software security iv) None of the above
9. Some of the methods of hardware protection are:
i) Fire Alarms ii) Security Lighting iii) Closed-circuit cameras iv) All of above
10. c) The temperature in computer system should be maintained between ______to________
i)21`C to 24`C ii) 20`C to 25`C iii) 23`C to 28`C iv) None of the above
11. d) A device that protects your PC against power surges and spikes.
i) UPS ii) Voltage Regulator iii) Surge suppressor iv) All of the above
12. e) The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security ii) Hardware security iii) Software security iv) None of the above
13. Some of the methods of hardware protection are:
i. Password security ii. Security lighting iii. Scandisk iv. All of the above
14. The temperature in the computer system should be maintained between and .
i.68 to 72 degree Fahrenheit ii.88 to 78 degree Fahrenheit iii.68 to 27 degree Fahrenheit iv. All
15. is a device that allows your computer to keep running for at least a short time when the primary
power source is lost.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
16. An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
17. refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation ii. Defragmentation iii. Scan disk iv. All of the above
18. The process of loading the noncontiguous fragments of data, rearranging the fragments and restoring them into
fewer fragments or into the whole life.
i)Fragmentation ii) Defragmentation iii) Scan disk
19. Which of the following is not hardware security method?
i. Insurance ii. Maintenance iii. Closed-circuit cameras iv. Hard lock key
20. Which of the following measure allows to protect computers being opened from unauthorized user?
i. Antivirus program ii. Password iii. Debug iv. program
21. Which of the following is not power supply device?
i. Volt guard ii.UPS iii. Constant Voltage Transformer iv. Power Plug
22. Which of the following is not software security measure?
i. Virus Scanning ii. Scandisk iii. Password iv. Security Guard
23. Common computer security is
Hardware Security Software security Hardware & software security None of them
24. Hardware security includes
Regular maintenance Use of power of regulator devices Both None of them
25. Data and software security includes
Protection from computer virus Cover the computer property Both None of them
26. UPS is a
Voltage filtration device Voltage processing device Voltage regulator device None
27. Scan disk is performed by using
Application software Operating system software Utility software None
5 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections
28. Backup is way of
i. Securing data and information Securing internal part of the computer
ii. Securing external parts of the computer None of them
29. Defragmentation is a process of
Formatting the disk Relocation of the disk Relocation of the files of the disk None of them
30. Which device protects hardware?
i) UPS ii) MODEM iii) Gateway iv) All of the above
Answers:
1. Protection to a 2. Backup System 3. Scan disk 4. Hardware 5. UPS
computer System Security
6. Passwords 7.Removing Bad 8. Hardware Security 9. All of the 10. 21’C to 24’C
Clusters above
11. Surge Suppressor 12. Software 13. Security Lighting 14. 68 to 72 15. UPS
Security degree
Fahrenheit
16. Voltage 17. Fragmentation 18. Defragmentation 19. Hard Lock 20. Password
Regulator Key
21.Power Plug 22.Security Guard 23.Hardware & Software 24.Both 25.Protection form
Security computer viruses
26.Voltage regulator 27.Utility Software 28.securing data and 29.Relocation of 30.UPS
Device information the files of the
disk

40 True and False Questions


1. Computer security is concerned with hardware security only.
2. The use of ID card prevents unauthorized person from being entered in computer room.
3. IP cameras are used for the surveillance and maintenance.
4. Lighting cannot cause physical damage to physical system.
5. Software protection can be made by using physical security.
6. Antivirus program are used to protect from unauthorized people.
7. System maintenance is used to clear viruses from the system.
8. The regular maintenance helps to detect problems in computer hardware.
9. The dust particles can damage hard disk of a computer.
10. Loss of information costs more than protecting it.
11. Insurance is one of the computer security measures.
12. Defragmentation is the tool that ensures error free file management.
13. Scandisk helps to scan and remove viruses from computer.
14. The data and programs stored in a disk can not be damaged.
15. Security lighting and closed –circuit television cameras are the methods of software protection.
16. Fragmentation reduces data access time and allow storage to be used more efficiently.
17. Alarms, security lightning and closed-circuit television cameras are some of the methods of software protection.
18. Regular maintenance is important for ensuring that your computers operate at an optimal level.
19. Dust, fluctuation of electricity and over heat can damage hardware of computer system.
20. A computer requires a constant source of 110-volt AC power.
21. Backup is used for scanning and protecting computer from viruses.
22. The lost data and information can be easily recovered in computer.
23. The required voltage for computer system is 220 to 240.
24. Scandisk is a disk tool that allows checking files, folders, bad sectors, lost clusters, lost chains and any errors of the specific
disk.
25. When a hard disk of a computer system get damaged or lost, we don’t lose any data and information.
26. Hardware securing means securing hard disk from being damaged only.
27. A volt guard supplies back up electric power to the electronic goods when there is load shedding.
28. UPS is a device that maintains a constant voltage level.
29. Volt guard and stabilizer can supply back up electric power tom a computer system when there is power cut off.
30. The electronic device used in the setup of the computer are not delicate.
31. Valuable data and information may get lost due to the faulty wiring system.
32. Power protection devices protect computer software.

6 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections
33. Air conditioning is more important for the computer system where the temperature and the humidity must be controlled.
34. The loss of information can cause serious damage to the organization.
35. The routine servicing of hardware is a must to keep equipment tin good operating condition and to find and correct problems
before they develop into serious malfunctions.
36. Computer equipment should be used and stored at a relative humidity of 5 percent with 50 percent variation.
37. The password prevents unauthorized users to access a file, application or computer system.
38. Password protection can be implemented to the computer system only.
39. Password policy is very important for software security.
40. When we set a password to file, and unauthorized person can delete the file.

Answers:
1. False 2. True 3. True 4. False 5. False
6. False 7.False 8. True 9. True 10. True
11. True 12. False 13. False 14. False 15. False
16. False 17. False 18. True 19. True 20. True
21.False 22.False 23.True 24.True 25.False
26.False 27.False 28.Fasle 29.False 30.False
31.False 32.Fasle 33.True 34.True 35.True
36.False 37.True 38.False 39.True 40.False

15 Fill in the Blanks


1. The protection given to the computer hardware and software from being lost or damaged is known as _______
2. ________ protects the machine and peripheral devices from theft, damage and electronic instruction.
3. The _____ of hardware keeps the computer devices in good operating condition and helps to find out the
problems in hardware.
4. _________ an electrical regulator designed to automatically maintain a constant voltage level.
5. The suitable temperature in the computer room should be maintained between _____ to ______ degree
Celsius.
6. The tool that is used to maintain performance and error free file management is called ______
7. _______________ is the process of preventing and detecting unauthorized use of any computer.
8. A _______________ is an electrical device that provides “clean” AC power to sensitive electrical
equipment.
9. A _______________ is an appliance designed to protect electrical devices from voltage spikes.
10. A _______________is a secret series of characters that enables a user to access a file, computer, or program.
11. _______________ Focuses on protecting computers, networks, programs, and data from unintended or
unauthorized access, change or destruction.
12. A computer requires a constant source of _______________ AC power.
13. The recommended computer room temperature should be __________
14. _____________ is a battery supported power unit between and external power source and a computer system
which supplies clean and continuous power even during power failure.
15. _______________ is a device which provides continuous power and protects the computer equipments from
power surges and voltage fluctuations
Answers:
1. Computer Security 2. Hardware Security 3. regular maintenance 4. Voltage 5. 21 to 24
Regulator
6. scan disk 7.computer security 8. power conditioner 9. surge 10. password
suppressor
11. computer 12. 110 volt 13. 22o Celsius 14. UPS 15. UPS
security

5 Match the Following


7 | P a g e https://seeqbasicomputer.blogspot.com/
SEE COMPUTER SCIENCE 2074 [COMPUTER Security] 130 Questions Collections

1.
A) password Duplicate copy of data
B) Encryption Secret word or phrase
C) Backup Authentication
D) Access Control Rearrangement of fragmented file
Scrambled and unreadable form of information

2.
A) Antivirus Software that prevent gaining access
B) Scandisk Arranging the scattered data
C) Defragmentation Checking for disk error
D) Firewall Software to remove malicious Programs
Duplicating disk

3.
A) Hardware security Rewriting the files to contiguous sector
B) Software Scattering the disk file over different locations
C) Fragmentation Provide access to the computer system
D) Password Antivirus
Insurance policy

4.
A) Hard Lock Key Hardware Security
B) Spike guard Software security
C) Insurance Power protection device
D)Burlar alarm Computer Security
Prevents unauthorized entrance

5.
A) Backup Software that destroys data
B) Password Utility software
C) Scan Disk Copy of data
D)Computer virus Allows the user to access system
System Software

Answers:
1. c, a, d, -, b 2. D,C,B,A 3. -, c, d, b, a 4. c, a, b, -, d 5.d, c, a, b

***

8 | P a g e https://seeqbasicomputer.blogspot.com/

You might also like