Computer Questions Set- 128

0
2724

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. __________ is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Clickjacking[/spoiler]
  2. A virus _______ is a false warning about a computer virus.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Hoax[/spoiler]
  3. Which of the following is also known as an “UI redress attack”?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Clickjacking[/spoiler]
  4. Which of the following is a type of malware that is designed to change your browser’s settings?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacker
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans -C. Browser Hijacker[/spoiler]
  5. Which of the following is an unethical web practice that keeps users trapped on a particular site?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans -B. Mousetrapping[/spoiler]
  6. ________ is a mechanism for improving the time it takes to read from or write to a hard disk.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. disk cache
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – E. disk cache[/spoiler]
  7. Which of the following is the masking of server resources, including the number and identity of individual physical servers, processors, and OS, from server users?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. Server Virtualization
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – E. Server Virtualization[/spoiler]
  8. _________ is a computer networking device that builds the connection with the other bridge networks which use the same protocol.
    A. Router
    B. Bridge
    C. Gateway
    D. Dial-up router
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Bridge[/spoiler]
  9. _______ is a backup operational mode in which the functions of a system component.
    A. Router
    B. Bridge
    C. Gateway
    D. Failover
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Failover[/spoiler]
  10. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
    A. Clickjacking
    B. Pharming
    C. Browser Hijacking
    D. Mousetrapping
    E. Server Virtualization
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Pharming[/spoiler]