Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Dynamic Source Routing (DSR) is a self-maintaining routing protocol for ______
    A. Wireless Networks.
    B. Wired Networks
    C. WiFi eavesdropping
    D. All of these
    E. None of these
    Ans – A. Wireless Networks.

  2. _______ is a digitised and networked version of closed-circuit television (CCTV)
    A. Wireless Networks.
    B. Wired Networks
    C. WiFi eavesdropping
    D. IP surveillance
    E. None of these
    Ans – D. IP surveillance

  3. “I” in AIFF stands for _____
    A. Internal
    B. Internet
    C. Interchange
    D. Intermediate
    E. None of these
    Ans – C. Interchange(Audio Interchange File Format)

  4. Which of the following is a type of software used to provide secure internal, external and ad-hoc data transfers through a network?
    A. AIFF
    B. MFT
    C. Spyware
    D. Adware
    E. Donationware
    Ans -B. MFT – Managed File Transfer

  5. Which is the process of backing up server data to a centralised storage device rather than moving it across a local-area network (LAN).?
    A. Wireless Networks.
    B. Wired Networks
    C. WiFi eavesdropping
    D. LAN Free Backup
    E. LAN Backup
    Ans – D. LAN Free Backup

  6. Which of the following is an unauthorised access to a wireless LAN?
    A. Phishing
    B. Piggybacking
    C. Malicious Spyware
    D. Lock Screen Ransomware
    E. Encryption Ransomware
    Ans – B. Piggybacking

  7. _______ is a freeware utility that automates the process of computer renaming.
    A. Phishing
    B. Piggybacking
    C. Malicious Spyware
    D. wsname
    E. None of these
    Ans – D. wsname

  8. Piggybacking is also known as ______
    A. Pharming
    B. Wi-Fi squatting
    C. Phishing
    D. Spam
    E. None of these
    Ans – B. Wi-Fi squatting

  9. _______ is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
    A. Soft loading
    B. Counterfeiting
    C. Renting
    D. Ingress filtering
    E. None of these
    Ans – D. Ingress filtering

  10. _______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
    A. Soft loading
    B. Counterfeiting
    C. Renting
    D. Keylogger
    E. None of these
    Ans – D. Keylogger