Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- _______ is a method of combining the available resources in a network by splitting up the available bandwidth into channels
A. Storage virtualization
B. Network virtualization
C. OS virtualization
D. Hardware virtualization
E. None of theseAns – B. Network virtualization - Which of the following refers to the creation of a virtual machine that acts like a real computer with an operating system?
A. Storage virtualization
B. Network virtualization
C. OS virtualization
D. Hardware virtualization
E. None of theseAns -D. Hardware virtualization - Which of the following is software technology that encapsulates computer programs from the underlying operating system on which it is executed?
A. Storage virtualization
B. Network virtualization
C. OS virtualization
D. Application virtualization
E. None of theseAns – D. Application virtualization - Which of the following is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console?
A. Storage virtualization
B. Network virtualization
C. OS virtualization
D. Application virtualization
E. None of theseAns – A. Storage virtualization - ______ are used to record customer activity in e-commerce.
A. air gapping
B. audit trail
C. Promote
D. Period
E. None of theseAns – B. audit trail - ______ is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
A. air gapping
B. audit trail
C. Promote
D. Period
E. None of theseAns – A. air gapping - _______, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file
A. Ghost Imaging
B. Cache
C. Cookie
D. Docker
E. None of theseAns – A. Ghost Imaging - Which of the following is a network administration practice used to prevent the execution of undesirable programs?
A. Application Whitelisting
B. Application Blacklisting
C. Attack Surface
D. All of these
E. None of theseAns – B. Application Blacklisting - Which of the following is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system?
A. Application Whitelisting
B. Application Blacklisting
C. Attack Surface
D. All of these
E. None of theseAns – A. Application Whitelisting - ______ is the total sum of the vulnerabilities in a given device or network that are accessible to a hacker.
A. Application Whitelisting
B. Application Blacklisting
C. Attack Surface
D. All of these
E. None of theseAns – C. Attack Surface
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification