Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Which of the following is the process of backing up server data to a centralized storage device rather than moving it across a LAN?
A. Cold Backup
B. Hot Backup
C. LAN Free Backup
D. Server Free Backup
E. None of theseAns – C. LAN Free Backup
LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN) - Backup that is going to be done outside of the server is known as ______
A. Cold Backup
B. Hot Backup
C. LAN Free Backup
D. Server Free Backup
E. None of theseAns – D. Server Free Backup
Backup that is going to be done outside of the server is known as Server Free Backup - ______ is a database backup during which the database is offline and not accessible to updates.
A. Cold Backup
B. Hot Backup
C. Warm Backup
D. Server Free Backup
E. None of theseAns – A. Cold Backup - A cold backup is also known as ____.
A. Online Backup
B. Offline Backup
C. LAN Free Backup
D. Server Free Backup
E. None of theseAns – B. Offline Backup - ______ is a backup performed on data while the database is actively online and accessible to users.
A. Cold Backup
B. Hot Backup
C. Warm Backup
D. Server Free Backup
E. None of theseAns – B. Hot Backup - A Hot Backup is also known as ______
A. Online Backup
B. Offline Backup
C. Dynamic Backup
D. Both (B) and (C)
E. Both (A) and (C)Ans – E. Both (A) and (C)
A Hot Backup is also known as Online Backup or Dynamic Backup. - Which of the following is a technique where all the tables are locked and users cannot access at the time of backing up data?
A. Cold Backup
B. Hot Backup
C. Warm Backup
D. Server Free Backup
E. None of theseAns – C. Warm Backup - Which of the following is a large scale monetary theft conducted through computer hacking, the online equivalent of the real-world bank heist?
A. Spoofing
B. Cyber heist
C. Phishing
D. Plagiarism
E. None of theseAns – B. Cyber heist - ________ is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
A. Malware
B. Cyber heist
C. Spear Phishing
D. Plagiarism
E. None of theseAns – C. Spear Phishing - _______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.
A. ARP Spoofing
B. DNS Spoofing
C. IP Spoofing
D. All of these
E. None of theseAns – B. DNS Spoofing
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification