

MCQOPTIONS
Saved Bookmarks
This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
2801. |
What is anti-virus? |
A. | It is a program code |
B. | It is a company name |
C. | It is a computer |
D. | It is an application |
Answer» B. It is a company name | |
2802. |
To decide on a backup strategy for your organization, we should consider |
A. | RPO |
B. | RTO |
C. | Both a and b |
D. | ROM |
Answer» D. ROM | |
2803. |
Computer malicious program which is activated when a specific set of conditions is met is called |
A. | trojan horse |
B. | virus |
C. | worm |
D. | logic bomb |
Answer» E. | |
2804. |
Computer virus program is usually hidden in a |
A. | operating system |
B. | application program |
C. | disk driver |
D. | Both a and b |
Answer» E. | |
2805. |
Firewalls are used to protect against -------- |
A. | virus attacks |
B. | fire attacks |
C. | unauthorised access |
D. | data driven attacks |
Answer» D. data driven attacks | |
2806. |
Best quality of DR 'Disaster Recovery' is |
A. | DR site in the same campus |
B. | DR site in the same city |
C. | DR site in the same country |
D. | DR site in a different country |
Answer» E. | |
2807. |
Backup technique which is most space efficient is |
A. | full backup |
B. | incremental backup |
C. | differential backup |
D. | built-in backup |
Answer» C. differential backup | |
2808. |
Which one is not a computer virus? |
A. | Trojan horse |
B. | logic bomb |
C. | McAfee |
D. | redlof |
Answer» D. redlof | |
2809. |
Person who gains illegal access to a computer system is known as |
A. | hacker |
B. | worm |
C. | pirate |
D. | theif |
Answer» B. worm | |
2810. |
A way to prohibit user from accessing information that user is not authorized to access is known to be |
A. | Access control |
B. | Authorization |
C. | Authentication |
D. | Cryptography |
Answer» B. Authorization | |
2811. |
If you receive an email claiming to need your username and/or password, what should you do? |
A. | Report it as phishing/spam through your email provider |
B. | Delete the message |
C. | Reply to the message with your email and password |
D. | None |
Answer» B. Delete the message | |
2812. |
Which of the following is not a cause of computer virus? |
A. | |
B. | network |
C. | pirated software |
D. | logic bomb |
Answer» E. | |
2813. |
Which of the following can be used for reducing recovery time? |
A. | automatic failover |
B. | by taking backup on a faster device |
C. | taking multiple backups |
D. | all of these |
Answer» E. | |
2814. |
Which of the following is computer virus? |
A. | chernobal |
B. | logic bomb |
C. | redlof |
D. | all of these |
Answer» E. | |
2815. |
The most devastating loss to a company is |
A. | loss of hardware |
B. | loss of data |
C. | loss of software |
D. | loss of printouts |
Answer» C. loss of software | |
2816. |
The virus that spread in application software is called as |
A. | Boot virus |
B. | Macro virus |
C. | Anti virus |
D. | File virus |
Answer» C. Anti virus | |
2817. |
How does a Le-Hard virus come into existence? |
A. | Software |
B. | Hardware |
C. | Command.Com |
D. | FRIDAY 13 |
Answer» D. FRIDAY 13 | |
2818. |
Restricted access to the server computer room is present in a form of |
A. | logical security |
B. | enterprise security |
C. | physical security |
D. | user security |
Answer» D. user security | |
2819. |
Which of the following describes programs that can run independently travel from system to system and disrupt computer communication? |
A. | Viruses |
B. | Worm |
C. | Trojans |
D. | Droppers |
Answer» C. Trojans | |
2820. |
Which of the following is not a proper state of transaction? |
A. | partially aborted |
B. | partially committed |
C. | aborted |
D. | committed |
Answer» B. partially committed | |
2821. |
What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity? |
A. | Phishing scams |
B. | Computer viruses |
C. | Spyware scams |
D. | None of the above |
Answer» B. Computer viruses | |
2822. |
Which of the following virus overtake computer system, when it boots and destroy information? |
A. | Stealth virus |
B. | Trojan |
C. | Boot infectors |
D. | System infectors |
Answer» B. Trojan | |
2823. |
A -------- is a computer program that can replicate itself and spread from one computer to another. |
A. | PenDrive |
B. | Computer Virus |
C. | Mouse |
D. | Antivurs |
Answer» C. Mouse | |
2824. |
Example of backup software is |
A. | Amanda |
B. | Bacula |
C. | IBM Tivoli Storage Manager |
D. | all of these |
Answer» E. | |
2825. |
Code red is a(n) ---------- |
A. | Word Processing Software |
B. | Photo Editing Software |
C. | Antivirus |
D. | Virus |
Answer» E. | |
2826. |
Which of the following is/are threats for electronic payment systems? |
A. | Computer virus |
B. | Computer worms |
C. | Trojan horse |
D. | All of the above |
Answer» E. | |
2827. |
Which of the following is associated with error detector? |
A. | Odd parity bit |
B. | Even parity bit |
C. | Both Odd parity bit and Even parity bit |
D. | None of the above |
Answer» D. None of the above | |
2828. |
Computer virus that replicates itself is called |
A. | bug |
B. | worm |
C. | vaccine |
D. | bomb |
Answer» C. vaccine | |
2829. |
Backup of the source data can be created |
A. | on the same device |
B. | on another device |
C. | at some other location |
D. | all of these |
Answer» E. | |
2830. |
A virus that migrates freely within a large population of unauthorized email user is called a ------- |
A. | macro |
B. | flame war |
C. | plagiarism |
D. | worm |
Answer» B. flame war | |
2831. |
In a computer, Torjan Horse is a/an |
A. | anti virus |
B. | virus |
C. | software |
D. | hardware |
Answer» C. software | |
2832. |
Most computer crimes are committed by |
A. | hackers |
B. | international spies |
C. | highly paid computer consultants |
D. | web designers |
Answer» B. international spies | |
2833. |
Remote backup site is sometimes called the |
A. | primary site |
B. | secondary site |
C. | ternary site |
D. | main site |
Answer» C. ternary site | |
2834. |
In a computer, McAfee is a/an |
A. | virus |
B. | anti virus |
C. | hacker |
D. | worm |
Answer» C. hacker | |
2835. |
Key logger is a |
A. | Antivirus |
B. | Spyware |
C. | Firmware |
D. | All of the above |
Answer» C. Firmware | |
2836. |
Technique which can be used to optimize backed up data space is |
A. | encryption |
B. | compression |
C. | deduplication |
D. | Both b and c |
Answer» E. | |
2837. |
Viruses which executes when computer starts is |
A. | macro |
B. | file infector |
C. | boot sector |
D. | salami shaving |
Answer» D. salami shaving | |
2838. |
The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called? |
A. | Time Bomb |
B. | Cracker |
C. | Keylogger |
D. | Worm |
Answer» E. | |
2839. |
Social engineering is: |
A. | A website created for people who share common interests. |
B. | Scams distributed through email such as phishing, pharming and impersonation. |
C. | A targeted attack on a personal computer. |
D. | None |
Answer» C. A targeted attack on a personal computer. | |
2840. |
A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. |
A. | Macro Virus |
B. | Stealth virus |
C. | Polymorphic Virus |
D. | Parasitic Virus |
Answer» E. | |
2841. |
Access control is granted to users after qualifying for |
A. | Authorization |
B. | Authentication |
C. | Cryptography |
D. | Regular expressions |
Answer» C. Cryptography | |
2842. |
Both email attachments and downloaded files can spread malware. |
A. | True |
B. | False |
C. | Maybe |
D. | None |
Answer» B. False | |
2843. |
If you receive an e-mail offering to remove you from a mailing list, what should you do? |
A. | Do not respond |
B. | Call the local police |
C. | Respond promptly |
D. | Wait a week to see if the offer is repeated |
Answer» B. Call the local police | |
2844. |
A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. |
A. | polymorphic engine |
B. | multiple engine |
C. | mutual engine |
D. | mutation engine |
Answer» E. | |
2845. |
A deadlock exists in a system if and only if the wait for graph |
A. | has a cycle in it |
B. | has a path from first node to last node |
C. | is a tree |
D. | has a layout in it |
Answer» B. has a path from first node to last node | |
2846. |
A worm is... |
A. | A slimy pink thing that lives in dirt |
B. | Pieces of malicious code that make copies of themselves and spread through computers without human interaction. |
C. | An unsolicited email message. |
D. | None |
Answer» C. An unsolicited email message. | |
2847. |
All of the following are biometric techniques except |
A. | badge |
B. | retina |
C. | face |
D. | palm print |
Answer» E. | |
2848. |
Secret words or numbers used for protection of devices is called |
A. | biometrics data |
B. | backup |
C. | passwords |
D. | private words |
Answer» D. private words | |
2849. |
When computer virus starts to impact the data, it is known as |
A. | virus infection |
B. | virus spreading |
C. | data losing |
D. | shutting down |
Answer» B. virus spreading | |
2850. |
For computer system's security a total approach involves |
A. | Internal security |
B. | External security |
C. | Demanded security |
D. | Both a and b |
Answer» E. | |