Current Affairs APP

Computer Quiz : Internet & Computer Security Set – 12

Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.

  1. Which one of the following is a key function of firewall?
    A. Monitoring
    B. deleting
    C. moving
    D. None of the Above
    Answer
    A. Monitoring

  2. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
    A. Trojan Horse
    B. Logic bomb
    C. Firewall
    D. None of the Above
    Answer
    B. Logic bomb

  3. If your computer rebooting itself then it is likely that _________
    A. It has a virus
    B. It does not have enough memory
    C. There has been a power surge
    D. None of the Above
    Answer
    A. It has a virus

  4. The ________ of a Threat measures its potential impact on a System
    A. vulnerabilities
    B. degree of harm
    C. susceptibility
    D. None of the Above
    Answer
    B. degree of harm

  5. A digital signature is _______
    A. scanned signature
    B. encrypting information
    C. signature in binary form
    D. None of the Above
    Answer
    B. encrypting information

  6. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as ______
    A. Phishing
    B. Smishing
    C. Pharming
    D. None of the Above
    Answer
    C. Pharming

  7. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
    A. Pharming
    B. Smishing
    C. Vishing
    D. None of the Above
    Answer
    C. Vishing

  8. A type of phishing attack where mobile phone users receive text messages containing a Web site hyper link is called ________
    A. Pharming
    B. Smishing
    C. Vishing
    D. None of the Above
    Answer
    B. Smishing

  9. A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called ________
    A. Zombie
    B. Spoofing
    C. Vishing
    D. None of the Above
    Answer
    A. Zombie

  10. The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _________
    (A) Pharming
    (B) Spoofing
    (C) Vishing
    (D) None
    Answer
    (B) Spoofing





Exit mobile version