Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- A Program that attempts to remove spam before it reaches a user’s inbox is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Telnet
E. None of theseAns – B. Anti-Spam Program
A Program that attempts to remove spam before it reaches a user’s inbox is known as Anti-Spam Program - Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Telnet
E. None of theseAns – A. Anti-Virus Program
A program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as Anti Virus Program. - Computer file that records both successful and unsuccessful access attempts is known as _______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Audit Trail
E. None of theseAns – D. Audit Trail - Program or set of instructions in a program that allows users to bypass security controls when accessing a program or computer, or network is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Back door
D. Audit Trail
E. None of theseAns – C. Back door - Web site that uses encryption techniques to secure its data is known as _______
A. Script Kiddie
B. Secure Site
C. Social Engineering
D. Data Mining
E. None of theseAns – B. Secure Site - Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____
A. Hardware Vandalism
B. Pharming
C. Intrusion Detection
D. Phishing
E. None of theseAns – C. Intrusion Detection
Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as Intrusion Detection Software. - A type of resource leak that occurs when a computer program incorrectly manages memory allocations is known as ______
A. Memory Leak
B. Intrusion Detection
C. Pharming
D. Hardware Vandalism
E. None of theseAns – A. Memory Leak - _____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
A. Memory Leak
B. Intrusion Detection
C. Blue Jacking
D. Hardware Vandalism
E. None of theseAns – C. Blue Jacking - The act of defacing or destroying computer equipment is known as _______
A. Memory Leak
B. Intrusion Detection
C. Blue Jacking
D. Hardware Vandalism
E. None of theseAns – D. Hardware Vandalism - A cookie that was not created by the website that attempts to access it is known as _____
A. First Party Cookie
B. Second Party Cookie
C. Third Party Cookie
D. Intrusion Detection
E. None of theseAns – C. Third Party Cookie
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification