Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- A Program that attempts to remove spam before it reaches a user’s inbox is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Telnet
E. None of these
Answer
Ans – B. Anti-Spam Program
A Program that attempts to remove spam before it reaches a user’s inbox is known as Anti-Spam Program - Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Telnet
E. None of these
Answer
Ans – A. Anti-Virus Program
A program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files is known as Anti Virus Program. - Computer file that records both successful and unsuccessful access attempts is known as _______
A. Anti-Virus Program
B. Anti-Spam Program
C. Adware
D. Audit Trail
E. None of these
Answer
Ans – D. Audit Trail - Program or set of instructions in a program that allows users to bypass security controls when accessing a program or computer, or network is known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Back door
D. Audit Trail
E. None of these
Answer
Ans – C. Back door
- Web site that uses encryption techniques to secure its data is known as _______
A. Script Kiddie
B. Secure Site
C. Social Engineering
D. Data Mining
E. None of these
Answer
Ans – B. Secure Site - Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____
A. Hardware Vandalism
B. Pharming
C. Intrusion Detection
D. Phishing
E. None of these
Answer
Ans – C. Intrusion Detection
Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as Intrusion Detection Software. - A type of resource leak that occurs when a computer program incorrectly manages memory allocations is known as ______
A. Memory Leak
B. Intrusion Detection
C. Pharming
D. Hardware Vandalism
E. None of these
Answer
Ans – A. Memory Leak - _____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
A. Memory Leak
B. Intrusion Detection
C. Blue Jacking
D. Hardware Vandalism
E. None of these
Answer
Ans – C. Blue Jacking - The act of defacing or destroying computer equipment is known as _______
A. Memory Leak
B. Intrusion Detection
C. Blue Jacking
D. Hardware Vandalism
E. None of these
Answer
Ans – D. Hardware Vandalism - A cookie that was not created by the website that attempts to access it is known as _____
A. First Party Cookie
B. Second Party Cookie
C. Third Party Cookie
D. Intrusion Detection
E. None of these
Answer
Ans – C. Third Party Cookie
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification