Online Tests 2017

Computer Questions Set – 182

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is the process of backing up server data to a centralized storage device rather than moving it across a LAN?
    A. Cold Backup
    B. Hot Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Answer
  2. Backup that is going to be done outside of the server is known as ______
    A. Cold Backup
    B. Hot Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Answer
  3. ______ is a database backup during which the database is offline and not accessible to updates.
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Answer
  4. cold backup is also known as ____.
    A. Online Backup
    B. Offline Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Answer
  5. ______ is a backup performed on data while the database is actively online and accessible to users.
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Answer
  6. A Hot Backup is also known as ______
    A. Online Backup
    B. Offline Backup
    C. Dynamic Backup
    D. Both (B) and (C)
    E. Both (A) and (C)
    Answer
  7. Which of the following is a technique where all the tables are locked and users cannot access at the time of backing up data?
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Answer
  8. Which of the following is a large scale monetary theft conducted through computer hacking, the online equivalent of the real-world bank heist?
    A. Spoofing
    B. Cyber heist
    C. Phishing
    D. Plagiarism
    E. None of these
    Answer
  9. ________ is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
    A. Malware
    B. Cyber heist
    C. Spear Phishing
    D. Plagiarism
    E. None of these
    Answer
  10. _______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.
    A. ARP Spoofing
    B. DNS Spoofing
    C. IP Spoofing
    D. All of these
    E. None of these
    Answer
OliveBoard Android Apps for Competitive Exams