Computer Questions Set – 170

0
3874
computer

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. An individual computer in “Botnet” group is known as a ____ computer.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Zombie
    [/spoiler]
  2. _______ is something that plants into your system and immediately informs you that you have hundreds of infections which you don’t have.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – E. Scareware[/spoiler]
  3. ________is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers.
    A. Zombie
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Rootkit[/spoiler]
  4. _________ scams are fraudulent attempts by cybercriminals to obtain private information.
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Phishing[/spoiler]
  5. A ______ is a group of computers connected to the Internet that has been compromised by a hacker using a computer virus or Trojan horse.
    A. Network
    B. Botnet
    C. Dropper
    D. Server
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Botnet[/spoiler]
  6. _______ is a form of software which is programmed specifically to attack certain vulnerability.
    A. Backdoor
    B. Wabbits
    C. Exploit
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Exploit[/spoiler]
  7. A _______ is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor
    A. Backdoor
    B. Wabbits
    C. Exploit
    D. Dropper
    E. Dialer
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Dropper[/spoiler]
  8.  _____ is a form of Malware where it takes control of your computer to commit a computer crime.
    A. Rich text
    B. Crimeware
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Crimeware[/spoiler]
  9. The goal of a ______ is to bring down a web server by overloading it with access requests
    A. Dos attack
    B. Crimeware
    C. Malicious Spyware
    D. Rootkit
    E. Scareware
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Dos attack[/spoiler]
  10. DDOS stands for ______
    A. Different Denial of Service
    B. Distributed Denial of Service
    C. Distributed Difference of Service
    D. Distributed Denial of Server
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Distributed Denial of Service[/spoiler]