Current Affairs PDF

Computer Questions Set – 174

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1.  _______ is a method of combining the available resources in a network by splitting up the available bandwidth into channels
    A. Storage virtualization
    B. Network virtualization
    C. OS virtualization
    D. Hardware virtualization
    E. None of these
    Ans – B. Network virtualization

  2. Which of the following refers to the creation of a virtual machine that acts like a real computer with an operating system?
    A. Storage virtualization
    B. Network virtualization
    C. OS virtualization
    D. Hardware virtualization
    E. None of these
    Ans -D. Hardware virtualization

  3. Which of the following is software technology that encapsulates computer programs from the underlying operating system on which it is executed?
    A. Storage virtualization
    B. Network virtualization
    C. OS virtualization
    D. Application virtualization
    E. None of these
    Ans – D. Application virtualization

  4. Which of the following is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console?
    A. Storage virtualization
    B. Network virtualization
    C. OS virtualization
    D. Application virtualization
    E. None of these
    Ans – A. Storage virtualization

  5. ______ are used to record customer activity in e-commerce.
    A. air gapping
    B. audit trail
    C. Promote
    D. Period
    E. None of these
    Ans – B. audit trail

  6. ______ is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
    A. air gapping
    B. audit trail
    C. Promote
    D. Period
    E. None of these
    Ans – A. air gapping

  7. _______, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file
    A. Ghost Imaging
    B. Cache
    C. Cookie
    D. Docker
    E. None of these
    Ans – A. Ghost Imaging

  8. Which of the following is a network administration practice used to prevent the execution of undesirable programs?
    A. Application Whitelisting
    B. Application Blacklisting
    C. Attack Surface
    D. All of these
    E. None of these
    Ans – B. Application Blacklisting

  9. Which of the following is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system?
    A. Application Whitelisting
    B. Application Blacklisting
    C. Attack Surface
    D. All of these
    E. None of these
    Ans – A. Application Whitelisting

  10. ______ is the total sum of the vulnerabilities in a given device or network that are accessible to a hacker.
    A. Application Whitelisting
    B. Application Blacklisting
    C. Attack Surface
    D. All of these
    E. None of these
    Ans – C. Attack Surface