Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Dynamic Source Routing (DSR) is a self-maintaining routing protocol for ______
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. All of these
E. None of theseAns – A. Wireless Networks.
- _______ is a digitised and networked version of closed-circuit television (CCTV)
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. IP surveillance
E. None of theseAns – D. IP surveillance - “I” in AIFF stands for _____
A. Internal
B. Internet
C. Interchange
D. Intermediate
E. None of theseAns – C. Interchange(Audio Interchange File Format) - Which of the following is a type of software used to provide secure internal, external and ad-hoc data transfers through a network?
A. AIFF
B. MFT
C. Spyware
D. Adware
E. DonationwareAns -B. MFT – Managed File Transfer - Which is the process of backing up server data to a centralised storage device rather than moving it across a local-area network (LAN).?
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. LAN Free Backup
E. LAN BackupAns – D. LAN Free Backup - Which of the following is an unauthorised access to a wireless LAN?
A. Phishing
B. Piggybacking
C. Malicious Spyware
D. Lock Screen Ransomware
E. Encryption RansomwareAns – B. Piggybacking - _______ is a freeware utility that automates the process of computer renaming.
A. Phishing
B. Piggybacking
C. Malicious Spyware
D. wsname
E. None of theseAns – D. wsname - Piggybacking is also known as ______
A. Pharming
B. Wi-Fi squatting
C. Phishing
D. Spam
E. None of theseAns – B. Wi-Fi squatting - _______ is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
A. Soft loading
B. Counterfeiting
C. Renting
D. Ingress filtering
E. None of theseAns – D. Ingress filtering - _______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
A. Soft loading
B. Counterfeiting
C. Renting
D. Keylogger
E. None of theseAns – D. Keylogger
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification