Home   »   Computer Quiz (Computer Security) for RRBs/IBPS...

Computer Quiz (Computer Security) for RRBs/IBPS Exam

Computer Quiz (Computer Security) for RRBs/IBPS Exam |_2.1

Q1. VIRUS stands for___.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these


Q2. To protect yourself from computer hacker, you should turn on a __________.
(a) Firewall
(b) Script
(c) VLC
(d) AUP
(e) Antivirus


Q3. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these


Q4. A __________ is one of thousands of programs that can invade computer and perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk).
(a) MS Access
(b) MS Word
(c) Antivirus
(d) Computer Virus
(e) None of these


Q5. What is short name for malicious software (i.e. software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
(a) Moleculewar
(b) Malisoft
(c) Malairasoft
(d) Malware
(e) None of these


Q6. __________ means to prove/verify the identity of the entity that tries to access the system’s resources.
(a) Entity authentication
(b) Message authentication
(c) Password authentication
(d) All of the above
(e) None of these


Q7. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
(a) Cracker
(b) Worm
(c) Trojan horses
(d) Keylogger
(e) None of these


Q8. Which of the following is/are threat(s) for electronic payment system?
(a) Trojan horse
(b) Computer virus
(c) Computer worms
(d) All of the above
(e) None of these


Q9. Which of the following virus overtake computer system, when it boots and destroy information?
(a) Trojan
(b) System infectors
(c) Stealth virus
(d) Boot infectors
(e) None of these

Q10. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
(a) Trojans
(b) Viruses
(c) Worm
(d) Droppers
(e) All of these


Q11. The first Computer Virus is __________.
(a) Creeper 
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these


Q12. McAfee is an example of __________.
(a) Virus
(b) Antivirus
(c) Word Processing Software
(d) Photo Editing Software
(e) None of these


Q13. __________ are attempt by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing trips
(b) Computer viruses
(c) Spyware scams
(d) Viruses
(e) Phishing scams


Q14. In digital signature, the private key is used for __________ and the public key for __________.
(a) encryption, decryption
(b) decryption, encryption
(c) plaintext, ciphertext
(d) ciphertext, plaintext
(e) None of these


Q15. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these


Computer Quiz (Computer Security) for RRBs/IBPS Exam |_3.1


Computer Quiz (Computer Security) for RRBs/IBPS Exam |_4.1

Computer Quiz (Computer Security) for RRBs/IBPS Exam |_5.1

Computer Quiz (Computer Security) for RRBs/IBPS Exam |_6.1

Computer Quiz (Computer Security) for RRBs/IBPS Exam |_7.1

Computer Quiz (Computer Security) for RRBs/IBPS Exam |_8.1
Test Prime For All Exams 2024