-
question_answer1)
A ......... is anything that can cause harm.
A)
vulnerability done
clear
B)
phishing done
clear
C)
threat done
clear
D)
spoof done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer2)
A ......... is a small program embedded inside of a GIF image.
A)
Web bug done
clear
B)
cookie done
clear
C)
spyware application done
clear
D)
spam done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer3)
A hacker contacts your phone or E-mails and attempts to acquire your password is called
A)
spoofing done
clear
B)
phishing done
clear
C)
spamming done
clear
D)
bugging done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer4)
The unauthorised real-time interception of a private communication such as a phone call, instant message known as
A)
Replay done
clear
B)
Eavesdropping done
clear
C)
Patches done
clear
D)
Payloads done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer5)
Hackers often gain entry to a network be pretending to be at a legitimate computer
A)
spoofing done
clear
B)
forging done
clear
C)
IP spoofing done
clear
D)
All of these done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer6)
The main reason to encrypt a file is to
A)
reduce its size done
clear
B)
secure it for transmission done
clear
C)
prepare it for backup done
clear
D)
include it in the start-up sequence done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer7)
Mechanism to protect network from outside attack is
A)
firewall done
clear
B)
antivirus done
clear
C)
digital signature done
clear
D)
formatting done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer8)
......... is a form of virus explicitly designed to hide itself from detection by antivirus software.
A)
Stealth virus done
clear
B)
Polymorphic virus done
clear
C)
Parasitic virus done
clear
D)
Macro virus done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer9)
The first PC virus was developed in
A)
1980 done
clear
B)
1984 done
clear
C)
1986 done
clear
D)
1988 done
clear
E)
1987 done
clear
View Solution play_arrow
-
question_answer10)
Abuse messaging systems to send unsolicited is
A)
phishing done
clear
B)
spam done
clear
C)
malware done
clear
D)
firewall done
clear
E)
adware done
clear
View Solution play_arrow
-
question_answer11)
......... are often delivered to PC through an E-mail attachment and are often designed to do harm.
A)
Viruses done
clear
B)
Spams done
clear
C)
Portals done
clear
D)
E-mail messages done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer12)
The first computer virus is
A)
creeper done
clear
B)
PARAM done
clear
C)
the famous done
clear
D)
HARLIE done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer13)
A time bomb occurs during a particular
A)
data or time done
clear
B)
logic and data done
clear
C)
time done
clear
D)
All of these done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer14)
First boot sector virus is
A)
computed done
clear
B)
mind done
clear
C)
brain done
clear
D)
Elk Cloner done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer15)
Which virus spreads in application software?
A)
Macro virus done
clear
B)
Boot virus done
clear
C)
File virus done
clear
D)
Antivirus done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer16)
Some viruses have a delayed payload, which is sometimes called a
A)
time done
clear
B)
anti-virus done
clear
C)
bomb done
clear
D)
All of these done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer17)
An antivirus is a (n)
A)
program code done
clear
B)
computer done
clear
C)
company name done
clear
D)
application software done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer18)
It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
A)
Keylogger done
clear
B)
Worm done
clear
C)
Virus done
clear
D)
Cracker done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer19)
Like a virus, it is a self-replicating program. It also propagates through computer network.
A)
Spyware done
clear
B)
Worm done
clear
C)
Cracker done
clear
D)
Phishing scam done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer20)
What is an E-mail attachment?
A)
A receipt sent by the recipient done
clear
B)
A separate document from another program sent along with an E-mail message done
clear
C)
A malicious parasite that feeds off your messages and destroys the contents done
clear
D)
A list of Cc: or Bcc: recipients done
clear
E)
A friend to whom E-mail is sent regularly done
clear
View Solution play_arrow
-
question_answer21)
Password enables users to
A)
get into the system quickly done
clear
B)
make efficient use of time done
clear
C)
retain confidentiality of files done
clear
D)
simplify file structure done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer22)
A program designed to destroy data on your computer which can travel to infect other computers, is called a
A)
disease done
clear
B)
tarpedo done
clear
C)
hurricave done
clear
D)
virus done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer23)
Antivirus software is an example of
A)
business software done
clear
B)
an operating system done
clear
C)
a security done
clear
D)
an office suite done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer24)
Hackers
A)
all have the same motive done
clear
B)
is another name of users done
clear
C)
many legally break into computer as long as they do not do any damage done
clear
D)
are people who are allergic to computers done
clear
E)
break into other people's computer done
clear
View Solution play_arrow
-
question_answer25)
Which was the first PC boot sector virus?
A)
Creeper done
clear
B)
Payload done
clear
C)
Bomb done
clear
D)
Brain done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer26)
There are viruses that are triggered by the passage of time or on a certain date.
A)
Boot-sector viruses done
clear
B)
Macro viruses done
clear
C)
Time bombs done
clear
D)
Worms done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer27)
It is the process of finding errors in software code
A)
Debugging done
clear
B)
Compiling done
clear
C)
Testing done
clear
D)
All of these done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer28)
......... is the process of finding errors in software code?
A)
Compiling done
clear
B)
Testing done
clear
C)
Running done
clear
D)
Debugging done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer29)
Which one of the following is a cryptographic protocol used to secure http connection? [RBI Grade B 2009]
A)
Stream Control Transmission Protocol (SCTP) done
clear
B)
Transport Layer Security (TLS) done
clear
C)
Explicit Congestion Notification (ECN) done
clear
D)
Resource Reservation Protocol (RRP) done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer30)
A firewall operated by [SBI Clerk 2010]
A)
the pre-purchase phase done
clear
B)
isolating intranet from extranet done
clear
C)
screening packets to/from the network and provide controllable filtering of network traffic done
clear
D)
All of the above done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer31)
Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010]
A)
Spoofing done
clear
B)
Phishing done
clear
C)
Stalking done
clear
D)
Hacking done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer32)
Which one of the following is a key function of firewall? [SBI PO 2010]
A)
Monitoring done
clear
B)
Deleting done
clear
C)
Copying done
clear
D)
Moving done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer33)
Junk E-mail is also called [Union Bank of India 2011]
A)
spam done
clear
B)
spoof done
clear
C)
sniffer script done
clear
D)
spool done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer34)
A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a [Allahabad Bank PO 2011]
A)
spammer done
clear
B)
hacker done
clear
C)
instant messenger done
clear
D)
All of these done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer35)
Vendor created program modifications are called [Allahabad Bank PO 2011]
A)
patches done
clear
B)
antiviruses done
clear
C)
hales done
clear
D)
fixes done
clear
E)
overlaps done
clear
View Solution play_arrow
-
question_answer36)
The ......... of a threat measures its potential impact on a system. [IBPS Clerk 2011]
A)
vulnerabilities done
clear
B)
counter measures done
clear
C)
degree of harm done
clear
D)
susceptibility done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer37)
A digital signature is [SBI Clerk 2011]
A)
scanned signature done
clear
B)
signature in binary form done
clear
C)
encrypting information done
clear
D)
handwritten signature done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer38)
Which of the following a computer's memory, but unlike a virus, it does not replicate itself? [SBI PO 2011]
A)
Trojan horse done
clear
B)
Logic bomb done
clear
C)
Cracker done
clear
D)
Firewall done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer39)
Computer virus is [IBPS Clerk 2011]
A)
a hardware done
clear
B)
windows tool done
clear
C)
a computer program done
clear
D)
a system software done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer40)
A program designed to destroy data on your computer which can travel to "infect" other computers is called a [RBI Grade B 2012]
A)
disease done
clear
B)
torpedo done
clear
C)
hurricane done
clear
D)
virus done
clear
E)
infector done
clear
View Solution play_arrow
-
question_answer41)
If your computer rebooting itself then it is likely that [SBI Clerk 2012]
A)
It has a virus done
clear
B)
It does not have enough memory done
clear
C)
There is no printer done
clear
D)
There has been a power surge done
clear
E)
It need a CD-ROM done
clear
View Solution play_arrow
-
question_answer42)
Viruses, trojan horses and worms are [IBPS Clerk 2012]
A)
able to harm computer system done
clear
B)
unable to detect if present on computer done
clear
C)
user-friendly applications done
clear
D)
harmless applications resident on computer done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer43)
To protect yourself from computer hacker intrusions you should install a [RBI Grade B 2012]
A)
firewall done
clear
B)
mailer done
clear
C)
macro done
clear
D)
script done
clear
E)
None of these done
clear
View Solution play_arrow
-
question_answer44)
The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012]
A)
software privacy policy done
clear
B)
software license done
clear
C)
software password manager done
clear
D)
software log done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer45)
......... are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011, IBPS Clerk 2013]
A)
Phishing trips done
clear
B)
Computer viruses done
clear
C)
Spyware scams done
clear
D)
Viruses done
clear
E)
Phishing scams done
clear
View Solution play_arrow
-
question_answer46)
All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014]
A)
hackers done
clear
B)
spam done
clear
C)
viruses done
clear
D)
identify theft done
clear
E)
None of the above done
clear
View Solution play_arrow
-
question_answer47)
Which of the following refers to dangerous programs that can be 'caught' of opening E-mail attachments and downloading software from the Internet? [SBI PO 2014]
A)
Utility done
clear
B)
Virus done
clear
C)
Honey Pot done
clear
D)
Spam done
clear
E)
App done
clear
View Solution play_arrow
-
question_answer48)
Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014]
A)
Hackers done
clear
B)
Spammers done
clear
C)
Phish done
clear
D)
Identity thefts done
clear
E)
Cookies done
clear
View Solution play_arrow
-
question_answer49)
What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014]
A)
Cyber Terrorist done
clear
B)
Black-hat-Hacker done
clear
C)
Cyber Cracker done
clear
D)
Hacktivist done
clear
E)
Other than those given as options done
clear
View Solution play_arrow
-
question_answer50)
Verification of a login name and password is known as [IBPS Clerk 2014]
A)
configuration done
clear
B)
accessibility done
clear
C)
authentication done
clear
D)
logging in done
clear
E)
Other than those given as options done
clear
View Solution play_arrow
-
question_answer51)
......... refers to the unauthorised copying and distribution of software. [IBPS Clerk 2014]
A)
Hacking done
clear
B)
Software piracy done
clear
C)
Software literacy done
clear
D)
Cracking done
clear
E)
Copyright done
clear
View Solution play_arrow
-
question_answer52)
Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as [IBPS Clerk 2014]
A)
Malicious software (malware) done
clear
B)
adware done
clear
C)
scareware done
clear
D)
spyware done
clear
E)
firewall done
clear
View Solution play_arrow
-
question_answer53)
...... are often delivered to a PC through an mail attachment and are often designed to do harm. [IBPS PO 2015]
A)
Portals done
clear
B)
Spam done
clear
C)
Viruses done
clear
D)
Other than those given as options done
clear
E)
E-mail messages done
clear
View Solution play_arrow
-
question_answer54)
A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]
A)
host program done
clear
B)
target program done
clear
C)
backdoor program done
clear
D)
Bluetooth done
clear
E)
Trojan horse done
clear
View Solution play_arrow
-
question_answer55)
If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016]
A)
Authentication done
clear
B)
Automation done
clear
C)
Firewall done
clear
D)
Encryption done
clear
E)
Decryption done
clear
View Solution play_arrow