Current Affairs PDF

Computer Questions Set – 188

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. A Program that attempts to remove spam before it reaches a user’s inbox is known as ______
    A. Anti-Virus Program
    B. Anti-Spam Program
    C. Adware
    D. Telnet
    E. None of these
    Ans – B. Anti-Spam Program
    A Program that attempts to remove spam before it reaches a user’s inbox is known as Anti-Spam Program

  2. Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as ______
    A. Anti-Virus Program
    B. Anti-Spam Program
    C. Adware
    D. Telnet
    E. None of these
    Ans – A. Anti-Virus Program
    A program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as Anti Virus Program.

  3. Computer file that records both successful and unsuccessful access attempts is known as _______
    A. Anti-Virus Program
    B. Anti-Spam Program
    C. Adware
    D. Audit Trail
    E. None of these
    Ans – D. Audit Trail

  4. Program or set of instructions in a program that allows users to bypass security controls when accessing a program or computer, or network is known as ______
    A. Anti-Virus Program
    B. Anti-Spam Program
    C. Back door
    D. Audit Trail
    E. None of these
    Ans – C. Back door

  5. Web site that uses encryption techniques to secure its data is known as _______
    A. Script Kiddie
    B. Secure Site
    C. Social Engineering
    D. Data Mining
    E. None of these
    Ans – B. Secure Site

  6. Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____
    A. Hardware Vandalism
    B. Pharming
    C. Intrusion Detection
    D. Phishing
    E. None of these
    Ans – C. Intrusion Detection
    Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as Intrusion Detection Software.

  7. A type of resource leak that occurs when a computer program incorrectly manages memory allocations is known as ______
    A. Memory Leak
    B. Intrusion Detection
    C. Pharming
    D. Hardware Vandalism
    E. None of these
    Ans – A. Memory Leak

  8. _____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
    A. Memory Leak
    B. Intrusion Detection
    C. Blue Jacking
    D. Hardware Vandalism
    E. None of these
    Ans – C. Blue Jacking

  9. The act of defacing or destroying computer equipment is known as _______
    A. Memory Leak
    B. Intrusion Detection
    C. Blue Jacking
    D. Hardware Vandalism
    E. None of these
    Ans – D. Hardware Vandalism

  10. A cookie that was not created by the website that attempts to access it is known as _____
    A. First Party Cookie
    B. Second Party Cookie
    C. Third Party Cookie
    D. Intrusion Detection
    E. None of these
    Ans – C. Third Party Cookie