Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.
- Which one of the following is a key function of firewall?
A. Monitoring
B. deleting
C. moving
D. None of the AboveA. Monitoring - Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
A. Trojan Horse
B. Logic bomb
C. Firewall
D. None of the AboveB. Logic bomb - If your computer rebooting itself then it is likely that _________
A. It has a virus
B. It does not have enough memory
C. There has been a power surge
D. None of the AboveA. It has a virus - The ________ of a Threat measures its potential impact on a System
A. vulnerabilities
B. degree of harm
C. susceptibility
D. None of the AboveB. degree of harm - A digital signature is _______
A. scanned signature
B. encrypting information
C. signature in binary form
D. None of the AboveB. encrypting information - A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as ______
A. Phishing
B. Smishing
C. Pharming
D. None of the AboveC. Pharming - The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
A. Pharming
B. Smishing
C. Vishing
D. None of the AboveC. Vishing - A type of phishing attack where mobile phone users receive text messages containing a Web site hyper link is called ________
A. Pharming
B. Smishing
C. Vishing
D. None of the AboveB. Smishing - A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called ________
A. Zombie
B. Spoofing
C. Vishing
D. None of the AboveA. Zombie - The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _________
(A) Pharming
(B) Spoofing
(C) Vishing
(D) None(B) Spoofing
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification