Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.
- Hardware or software designed to guard against unauthorized access to a computer network is known as ________
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. None of the AboveB. Firewall - An Internet service that translates domain names to the IP addresses is called ________
A. CMS
B. ASP
C. DNS
D. None of the AboveC. DNS - A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as ________
A. Content Management System (CMS)
B. ASP
C. DNS
D. None of the AboveA. Content Management System (CMS) - Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called __________
A. Piggybacking
B. Penetration
C. Phishing
D. None of the AboveA. Piggybacking - The unauthorized activities of malicious software is called __________
A. Pharming
B. Payload
C. Phishing
D. None of the AboveB. Payload - Unauthorized access to restricted systems or resources is referred as __________
A. Pharming
B. Penetration
C. Phishing
D. None of the AboveB. Penetration - Spam over Internet telephony is known as ____________
A. Malware
B. Spit
C. Pharming
D. None of the AboveB. Spit - Modifying data in a Domain Name System (DNS) server so that calls to particular Websites or even entire domains are misdirected for fraudulent purposes is termed as __________
A. DNS cache poisoning
B. Penetration
C. Phishing
D. None of the AboveA. DNS cache poisoning - Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ___________
A. Logic bomb
B. Mail bombing
C. Time bomb
D. None of the AboveB. Mail bombing - Malicious modification or destruction of data such as changing information on Web sites is called__________
A. Super zapping
B. Vandalism
C. Spamming
D. NoneB. Vandalism
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification