Current Affairs PDF

Computer Questions Set – 194

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. A spyware and adware removal computer program is known as ______
    A. Packet Sniffer
    B. Rootkit
    C. Script Kiddie
    D. Spybot
    E. None of these
    Ans – D. Spybot

  2. When you visit certain Web sites spyware may be automatically downloaded. This is known as ______
    A. virus.
    B. spybot
    C. logic bomb.
    D. drive-by download
    E. None of these
    Ans – D. drive-by download

  3. Software programs that close potential security breaches in an operating system are known as ________
    A. security breach fixes.
    B. refresh patches.
    C. security repairs.
    D. security patches
    E. None of these
    Ans – D. security patches

  4. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as _______
    A. a virus.
    B. a Trojan horse.
    C. cracking.
    D. a denial of service attack.
    E. None of these
    Ans – D. a denial of service attack.

  5. Hackers who hijack legitimate Web sites and redirect users to other sites are called ______
    A. hackers.
    B. Trojan horses.
    C. webjackers.
    D. denial of service attackers.
    E. None of these
    Ans – C. webjackers.

  6. When a logic bomb is activated by a time-related event, it is known as a ______
    A. time-related bomb sequence.
    B. virus.
    C. time bomb.
    D. Trojan horse
    E. None of these
    Ans – C. time bomb.

  7. A(n) ______ attaches itself to documents that contain embedded programs that automate tasks.
    A. hackers.
    B. Trojan horses.
    C. webjackers.
    D. macro virus
    E. None of these
    Ans – D. macro virus

  8. A microprocessor-controlled badge is called a(n) ___________.
    A. Super Badge
    B. Passive Badge
    C. Active Badge
    D. All of these
    E. None of these
    Ans – C. Active Badge

  9. Special purpose hardware that will allow every message to be encrypted is called a(n) _______
    A. Synchronization Processor
    B. Synchronous Processor
    C. Security Processor
    D. All of these
    E. None of these
    Ans – C. Security Processor

  10. Hardware or software designed to guard against unauthorized access to a computer network is known as ______
    A. hacker-proof program.
    B. firewall.
    C. hacker-resistant server.
    D. All of these
    E. None of these
    Ans – B. firewall.