Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Dynamic Source Routing (DSR) is a self-maintaining routing protocol for ______
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. All of these
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Wireless Networks.
[/spoiler] - _______ is a digitised and networked version of closed-circuit television (CCTV)
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. IP surveillance
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. IP surveillance[/spoiler] - “I” in AIFF stands for _____
A. Internal
B. Internet
C. Interchange
D. Intermediate
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Interchange(Audio Interchange File Format)[/spoiler] - Which of the following is a type of software used to provide secure internal, external and ad-hoc data transfers through a network?
A. AIFF
B. MFT
C. Spyware
D. Adware
E. Donationware
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans -B. MFT – Managed File Transfer[/spoiler] - Which is the process of backing up server data to a centralised storage device rather than moving it across a local-area network (LAN).?
A. Wireless Networks.
B. Wired Networks
C. WiFi eavesdropping
D. LAN Free Backup
E. LAN Backup
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. LAN Free Backup[/spoiler] - Which of the following is an unauthorised access to a wireless LAN?
A. Phishing
B. Piggybacking
C. Malicious Spyware
D. Lock Screen Ransomware
E. Encryption Ransomware
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Piggybacking[/spoiler] - _______ is a freeware utility that automates the process of computer renaming.
A. Phishing
B. Piggybacking
C. Malicious Spyware
D. wsname
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. wsname[/spoiler] - Piggybacking is also known as ______
A. Pharming
B. Wi-Fi squatting
C. Phishing
D. Spam
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Wi-Fi squatting[/spoiler] - _______ is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
A. Soft loading
B. Counterfeiting
C. Renting
D. Ingress filtering
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Ingress filtering [/spoiler] - _______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
A. Soft loading
B. Counterfeiting
C. Renting
D. Keylogger
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Keylogger[/spoiler]