Current Affairs PDF

Computer Quiz : Internet & Computer Security Set – 12

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Dear Aspirants,
Welcome to Online Computer Quiz in Affairscloud.com. Here we are providing sample questions in Internet & Computer Security. It will be very useful for all SBI/IBPS/LIC exams and other competitive exams. We have also included some important questions that are repeatedly asked in previous exams.

  1. Which one of the following is a key function of firewall?
    A. Monitoring
    B. deleting
    C. moving
    D. None of the Above
    A. Monitoring

  2. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
    A. Trojan Horse
    B. Logic bomb
    C. Firewall
    D. None of the Above
    B. Logic bomb

  3. If your computer rebooting itself then it is likely that _________
    A. It has a virus
    B. It does not have enough memory
    C. There has been a power surge
    D. None of the Above
    A. It has a virus

  4. The ________ of a Threat measures its potential impact on a System
    A. vulnerabilities
    B. degree of harm
    C. susceptibility
    D. None of the Above
    B. degree of harm

  5. A digital signature is _______
    A. scanned signature
    B. encrypting information
    C. signature in binary form
    D. None of the Above
    B. encrypting information

  6. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as ______
    A. Phishing
    B. Smishing
    C. Pharming
    D. None of the Above
    C. Pharming

  7. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
    A. Pharming
    B. Smishing
    C. Vishing
    D. None of the Above
    C. Vishing

  8. A type of phishing attack where mobile phone users receive text messages containing a Web site hyper link is called ________
    A. Pharming
    B. Smishing
    C. Vishing
    D. None of the Above
    B. Smishing

  9. A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called ________
    A. Zombie
    B. Spoofing
    C. Vishing
    D. None of the Above
    A. Zombie

  10. The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _________
    (A) Pharming
    (B) Spoofing
    (C) Vishing
    (D) None
    (B) Spoofing