Current Affairs PDF

Computer Questions Set- 128

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. __________ is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    Ans – A. Clickjacking

  2. A virus _______ is a false warning about a computer virus.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    Ans – B. Hoax

  3. Which of the following is also known as an “UI redress attack”?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. All of these
    E. None of these
    Ans – A. Clickjacking

  4. Which of the following is a type of malware that is designed to change your browser’s settings?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacker
    D. All of these
    E. None of these
    Ans -C. Browser Hijacker

  5. Which of the following is an unethical web practice that keeps users trapped on a particular site?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. None of these
    Ans -B. Mousetrapping

  6. ________ is a mechanism for improving the time it takes to read from or write to a hard disk.
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. disk cache
    Ans – E. disk cache

  7. Which of the following is the masking of server resources, including the number and identity of individual physical servers, processors, and OS, from server users?
    A. Clickjacking
    B. Hoax
    C. Browser Hijacking
    D. Mousetrapping
    E. Server Virtualization
    Ans – E. Server Virtualization

  8. _________ is a computer networking device that builds the connection with the other bridge networks which use the same protocol.
    A. Router
    B. Bridge
    C. Gateway
    D. Dial-up router
    E. None of these
    Ans – B. Bridge

  9. _______ is a backup operational mode in which the functions of a system component.
    A. Router
    B. Bridge
    C. Gateway
    D. Failover
    E. None of these
    Ans – D. Failover

  10. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
    A. Clickjacking
    B. Pharming
    C. Browser Hijacking
    D. Mousetrapping
    E. Server Virtualization
    Ans – B. Pharming