Current Affairs PDF

Computer Quiz : Internet & Computer Security Set – 11

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.

  1. Hardware or software designed to guard against unauthorized access to a computer network is known as ________
    A. Hacker-proof program
    B. Firewall
    C. Hacker-resistant server
    D. None of the Above
    B. Firewall

  2. An Internet service that translates domain names to the IP addresses is called ________
    A. CMS
    B. ASP
    C. DNS
    D. None of the Above
    C. DNS

  3. A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as ________
    A. Content Management System (CMS)
    B. ASP
    C. DNS
    D. None of the Above
    A. Content Management System (CMS)

  4. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called __________
    A. Piggybacking
    B. Penetration
    C. Phishing
    D. None of the Above
    A. Piggybacking

  5. The unauthorized activities of malicious software is called __________
    A. Pharming
    B. Payload
    C. Phishing
    D. None of the Above
    B. Payload

  6. Unauthorized access to restricted systems or resources is referred as __________
    A. Pharming
    B. Penetration
    C. Phishing
    D. None of the Above
    B. Penetration

  7. Spam over Internet telephony is known as ____________
    A. Malware
    B. Spit
    C. Pharming
    D. None of the Above
    B. Spit

  8. Modifying data in a Domain Name System (DNS) server so that calls to particular Websites or even entire domains are misdirected for fraudulent purposes is termed as __________
    A. DNS cache poisoning
    B. Penetration
    C. Phishing
    D. None of the Above
    A. DNS cache poisoning

  9. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ___________
    A. Logic bomb
    B. Mail bombing
    C. Time bomb
    D. None of the Above
    B. Mail bombing

  10. Malicious modification or destruction of data such as changing information on Web sites is called__________
    A. Super zapping
    B. Vandalism
    C. Spamming
    D. None
    B. Vandalism