Solved papers for Banking Computers Computer Security Solved Paper - Computer & Network Security

done Solved Paper - Computer & Network Security

  • question_answer1) Passwords enable users to- [SBI Clerk, 2009]

    A) Get into the system quickly

    B) Make efficient use of time

    C) Retain confidentiality of files

    D) Simplify file structures

    E) None of these

    View Answer play_arrow
  • question_answer2) A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a [IBPS PO, 2011]

    A) Hacker

    B) analyst

    C) Instant messenger

    D) programmer

    E) Spammer

    View Answer play_arrow
  • question_answer3) _____ 'are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO, 2011]

    A) Phishing trips

    B) Computer viruses

    C) Spyware scams

    D) Viruses

    E) Phishing scams

    View Answer play_arrow
  • question_answer4) Why is it unethical to share copyrighted files with your friends? [IBPS PO, 2011]

    A) It is not unethical, because it is legal.

    B) It is unethical because the files are being given for free.

    C) Sharing copyrighted files without permission breaks copyright laws.

    D) It is not unethical because the files are being given for free.

    E) It is not unethical - anyone can access a computer

    View Answer play_arrow
  • question_answer5) You can protect sensitive data from prying eyes using ___ [IBPS Clerk, 2012]

    A) Encryption

    B) Passwords

    C) File locks

    D) File permissions

    E) None of these

    View Answer play_arrow
  • question_answer6) If your computer keeps rebooting itself, then it is likely that _____ [SBI Clerk, 2012]

    A) It has a virus

    B) It does not have enough memory

    C) There is no printer

    D) There has been a power surge

    E) It needs a CD-ROM

    View Answer play_arrow
  • question_answer7) Why is it unethical to share copyrighted files with your friends? [IBPS Clerk, 2014]

    A) It is not unethical, because it is legal.

    B) It is unethical because the files are being given for free.

    C) Sharing copyrighted files without permission breaks copyright laws.

    D) It is not unethical because the files are being given for free.

    E) It is not unethical - anyone can access a computer

    View Answer play_arrow
  • question_answer8) Which of the following is a program that uses a variety of different approaches to identify and eliminate spam? [IBPS Clerk, 2014]

    A) Directory search

    B) Anti-spam program

    C) Web server

    D) Web storefront creation package

    E) Virus

    View Answer play_arrow
  • question_answer9) A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a _______. [IBPS Clerk, 2014]

    A) Hacker

    B) analyst

    C) Instant messenger

    D) programmer

    E) Spammer

    View Answer play_arrow
  • question_answer10) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS Clerk, 2014]

    A) Phishing trips

    B) Computer viruses

    C) Spyware scams

    D) Viruses

    E) Phishing scams

    View Answer play_arrow
  • question_answer11) Accessing an unsecured Wi-Fi network from your current location without authorization is called ______. [SBI Clerk, 2014]

    A) Hacking

    B) War Driving

    C) Wi-Fi Piggybacking

    D) All of the above

    E) None of these

    View Answer play_arrow
  • question_answer12) A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access is called _____. [SBI Clerk, 2014]

    A) Malware

    B) Botnet

    C) Worm

    D) Motherboard

    E) Firewall

    View Answer play_arrow
  • question_answer13) An unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed is known as______ [SBI Clerk, 2014]

    A) Digital Certificate

    B) Hacking

    C) Pharming

    D) Error! Not a valid embedded object. Dot Con

    E) Digital Signature

    View Answer play_arrow
  • question_answer14) All of the following are examples of real security and privacy risks EXCEPT: [IBPS Clerk, 2015]

    A) Viruses

    B) Hackers

    C) Spam

    D) Identity theft

    E) None of these

    View Answer play_arrow
  • question_answer15) In IT, the technique of delaying outgoing acknowledgements temporarily is known as [SSC CGL, 2016]

    A) AR Acknowledgement

    B) AR request

    C) Piggybacking

    D) Piggyframing

    E) None of these

    View Answer play_arrow
  • question_answer16) The scrambling of code is known as: [IBPS Clerk Mains, 2016]

    A) Encryption

    B) Firewalling

    C) Scrambling

    D) Deception

    E) Permuting

    View Answer play_arrow
  • question_answer17) An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information? [IBPS Clerk Mains, 2016]

    A) Phishing

    B) Spam

    C) Hacking

    D) Cracking

    E) Malware

    View Answer play_arrow
  • question_answer18) Which of the following is the type of software that has self-replicating software that causes damage to files and system? [IBPS Clerk Mains, 2016]

    A) Viruses

    B) Trojan horses

    C) Bots

    D) Worms

    E) Backdoors

    View Answer play_arrow
  • question_answer19) The conversation of electronic data into another form is called- [IBPS RRB, 2016]

    A) Biometrics

    B) Encryption

    C) Compression

    D) Encapsulation

    E) None of these

    View Answer play_arrow
  • question_answer20) It is the process in which control information is added to a data packet as it moves through the layers of a communication module is termed as ______. [IBPS RRB, 2016]

    A) Encapsulation

    B) Encryption

    C) Decryption

    D) Coding

    E) None of these

    View Answer play_arrow

Study Package

Solved Paper - Computer & Network Security
  30 20

   


You need to login to perform this action.
You will be redirected in 3 sec spinner

Free
Videos