Current Affairs PDF

Computer Questions Set – 170

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. An individual computer in “Botnet” group is known as a ____ computer.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. None of these
    Ans – A. Zombie

  2. _______ is something that plants into your system and immediately informs you that you have hundreds of infections which you don’t have.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    Ans – E. Scareware

  3. ________is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    Ans – D. Rootkit

  4. _________ scams are fraudulent attempts by cybercriminals to obtain private information.
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    Ans – A. Phishing

  5. A ______ is a group of computers connected to the Internet that has been compromised by a hacker using a computer virus or Trojan horse.
    A. Network
    B. Botnet
    C. Dropper
    D. Server
    E. None of these
    Ans – B. Botnet

  6. _______ is a form of software which is programmed specifically to attack certain vulnerability.
    A. Backdoor
    B. Wabbits
    C. Exploit
    D. All of these
    E. None of these
    Ans – C. Exploit

  7. A _______ is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor
    A. Backdoor
    B. Wabbits
    C. Exploit
    D. Dropper
    E. Dialer
    Ans – D. Dropper

  8.  _____ is a form of Malware where it takes control of your computer to commit a computer crime.
    A. Rich text
    B. Crimeware
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    Ans – B. Crimeware

  9. The goal of a ______ is to bring down a web server by overloading it with access requests
    A. Dos attack
    B. Crimeware
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    Ans – A. Dos attack

  10. DDOS stands for ______
    A. Different Denial of Service
    B. Distributed Denial of Service
    C. Distributed Difference of Service
    D. Distributed Denial of Server
    E. None of these
    Ans – B. Distributed Denial of Service