question_answer 1) Passwords enable users to- [SBI Clerk, 2009]
A)
Get into the system quickly
done
clear
B)
Make efficient use of time
done
clear
C)
Retain confidentiality of files
done
clear
D)
Simplify file structures
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 2) A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a [IBPS PO, 2011]
A)
Hacker
done
clear
B)
analyst
done
clear
C)
Instant messenger
done
clear
D)
programmer
done
clear
E)
Spammer
done
clear
View Answer play_arrow
question_answer 3) _____ 'are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO, 2011]
A)
Phishing trips
done
clear
B)
Computer viruses
done
clear
C)
Spyware scams
done
clear
D)
Viruses
done
clear
E)
Phishing scams
done
clear
View Answer play_arrow
question_answer 4) Why is it unethical to share copyrighted files with your friends? [IBPS PO, 2011]
A)
It is not unethical, because it is legal.
done
clear
B)
It is unethical because the files are being given for free.
done
clear
C)
Sharing copyrighted files without permission breaks copyright laws.
done
clear
D)
It is not unethical because the files are being given for free.
done
clear
E)
It is not unethical - anyone can access a computer
done
clear
View Answer play_arrow
question_answer 5) You can protect sensitive data from prying eyes using ___ [IBPS Clerk, 2012]
A)
Encryption
done
clear
B)
Passwords
done
clear
C)
File locks
done
clear
D)
File permissions
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 6) If your computer keeps rebooting itself, then it is likely that _____ [SBI Clerk, 2012]
A)
It has a virus
done
clear
B)
It does not have enough memory
done
clear
C)
There is no printer
done
clear
D)
There has been a power surge
done
clear
E)
It needs a CD-ROM
done
clear
View Answer play_arrow
question_answer 7) Why is it unethical to share copyrighted files with your friends? [IBPS Clerk, 2014]
A)
It is not unethical, because it is legal.
done
clear
B)
It is unethical because the files are being given for free.
done
clear
C)
Sharing copyrighted files without permission breaks copyright laws.
done
clear
D)
It is not unethical because the files are being given for free.
done
clear
E)
It is not unethical - anyone can access a computer
done
clear
View Answer play_arrow
question_answer 8) Which of the following is a program that uses a variety of different approaches to identify and eliminate spam? [IBPS Clerk, 2014]
A)
Directory search
done
clear
B)
Anti-spam program
done
clear
C)
Web server
done
clear
D)
Web storefront creation package
done
clear
E)
Virus
done
clear
View Answer play_arrow
question_answer 9) A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a _______. [IBPS Clerk, 2014]
A)
Hacker
done
clear
B)
analyst
done
clear
C)
Instant messenger
done
clear
D)
programmer
done
clear
E)
Spammer
done
clear
View Answer play_arrow
question_answer 10) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS Clerk, 2014]
A)
Phishing trips
done
clear
B)
Computer viruses
done
clear
C)
Spyware scams
done
clear
D)
Viruses
done
clear
E)
Phishing scams
done
clear
View Answer play_arrow
question_answer 11) Accessing an unsecured Wi-Fi network from your current location without authorization is called ______. [SBI Clerk, 2014]
A)
Hacking
done
clear
B)
War Driving
done
clear
C)
Wi-Fi Piggybacking
done
clear
D)
All of the above
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 12) A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access is called _____. [SBI Clerk, 2014]
A)
Malware
done
clear
B)
Botnet
done
clear
C)
Worm
done
clear
D)
Motherboard
done
clear
E)
Firewall
done
clear
View Answer play_arrow
question_answer 13) An unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed is known as______ [SBI Clerk, 2014]
A)
Digital Certificate
done
clear
B)
Hacking
done
clear
C)
Pharming
done
clear
D)
Error! Not a valid embedded object. Dot Con
done
clear
E)
Digital Signature
done
clear
View Answer play_arrow
question_answer 14) All of the following are examples of real security and privacy risks EXCEPT: [IBPS Clerk, 2015]
A)
Viruses
done
clear
B)
Hackers
done
clear
C)
Spam
done
clear
D)
Identity theft
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 15) In IT, the technique of delaying outgoing acknowledgements temporarily is known as [SSC CGL, 2016]
A)
AR Acknowledgement
done
clear
B)
AR request
done
clear
C)
Piggybacking
done
clear
D)
Piggyframing
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 16) The scrambling of code is known as: [IBPS Clerk Mains, 2016]
A)
Encryption
done
clear
B)
Firewalling
done
clear
C)
Scrambling
done
clear
D)
Deception
done
clear
E)
Permuting
done
clear
View Answer play_arrow
question_answer 17) An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information? [IBPS Clerk Mains, 2016]
A)
Phishing
done
clear
B)
Spam
done
clear
C)
Hacking
done
clear
D)
Cracking
done
clear
E)
Malware
done
clear
View Answer play_arrow
question_answer 18) Which of the following is the type of software that has self-replicating software that causes damage to files and system? [IBPS Clerk Mains, 2016]
A)
Viruses
done
clear
B)
Trojan horses
done
clear
C)
Bots
done
clear
D)
Worms
done
clear
E)
Backdoors
done
clear
View Answer play_arrow
question_answer 19) The conversation of electronic data into another form is called- [IBPS RRB, 2016]
A)
Biometrics
done
clear
B)
Encryption
done
clear
C)
Compression
done
clear
D)
Encapsulation
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 20) It is the process in which control information is added to a data packet as it moves through the layers of a communication module is termed as ______. [IBPS RRB, 2016]
A)
Encapsulation
done
clear
B)
Encryption
done
clear
C)
Decryption
done
clear
D)
Coding
done
clear
E)
None of these
done
clear
View Answer play_arrow