Explore topic-wise MCQs in Current Affairs.

This section includes 2995 Mcqs, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

2801.

What is anti-virus?

A. It is a program code
B. It is a company name
C. It is a computer
D. It is an application
Answer» B. It is a company name
2802.

To decide on a backup strategy for your organization, we should consider

A. RPO
B. RTO
C. Both a and b
D. ROM
Answer» D. ROM
2803.

Computer malicious program which is activated when a specific set of conditions is met is called

A. trojan horse
B. virus
C. worm
D. logic bomb
Answer» E.
2804.

Computer virus program is usually hidden in a

A. operating system
B. application program
C. disk driver
D. Both a and b
Answer» E.
2805.

Firewalls are used to protect against --------

A. virus attacks
B. fire attacks
C. unauthorised access
D. data driven attacks
Answer» D. data driven attacks
2806.

Best quality of DR 'Disaster Recovery' is

A. DR site in the same campus
B. DR site in the same city
C. DR site in the same country
D. DR site in a different country
Answer» E.
2807.

Backup technique which is most space efficient is

A. full backup
B. incremental backup
C. differential backup
D. built-in backup
Answer» C. differential backup
2808.

Which one is not a computer virus?

A. Trojan horse
B. logic bomb
C. McAfee
D. redlof
Answer» D. redlof
2809.

Person who gains illegal access to a computer system is known as

A. hacker
B. worm
C. pirate
D. theif
Answer» B. worm
2810.

A way to prohibit user from accessing information that user is not authorized to access is known to be

A. Access control
B. Authorization
C. Authentication
D. Cryptography
Answer» B. Authorization
2811.

If you receive an email claiming to need your username and/or password, what should you do?

A. Report it as phishing/spam through your email provider
B. Delete the message
C. Reply to the message with your email and password
D. None
Answer» B. Delete the message
2812.

Which of the following is not a cause of computer virus?

A. e-mail
B. network
C. pirated software
D. logic bomb
Answer» E.
2813.

Which of the following can be used for reducing recovery time?

A. automatic failover
B. by taking backup on a faster device
C. taking multiple backups
D. all of these
Answer» E.
2814.

Which of the following is computer virus?

A. chernobal
B. logic bomb
C. redlof
D. all of these
Answer» E.
2815.

The most devastating loss to a company is

A. loss of hardware
B. loss of data
C. loss of software
D. loss of printouts
Answer» C. loss of software
2816.

The virus that spread in application software is called as

A. Boot virus
B. Macro virus
C. Anti virus
D. File virus
Answer» C. Anti virus
2817.

How does a Le-Hard virus come into existence?

A. Software
B. Hardware
C. Command.Com
D. FRIDAY 13
Answer» D. FRIDAY 13
2818.

Restricted access to the server computer room is present in a form of

A. logical security
B. enterprise security
C. physical security
D. user security
Answer» D. user security
2819.

Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

A. Viruses
B. Worm
C. Trojans
D. Droppers
Answer» C. Trojans
2820.

Which of the following is not a proper state of transaction?

A. partially aborted
B. partially committed
C. aborted
D. committed
Answer» B. partially committed
2821.

What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

A. Phishing scams
B. Computer viruses
C. Spyware scams
D. None of the above
Answer» B. Computer viruses
2822.

Which of the following virus overtake computer system, when it boots and destroy information?

A. Stealth virus
B. Trojan
C. Boot infectors
D. System infectors
Answer» B. Trojan
2823.

A -------- is a computer program that can replicate itself and spread from one computer to another.

A. PenDrive
B. Computer Virus
C. Mouse
D. Antivurs
Answer» C. Mouse
2824.

Example of backup software is

A. Amanda
B. Bacula
C. IBM Tivoli Storage Manager
D. all of these
Answer» E.
2825.

Code red is a(n) ----------

A. Word Processing Software
B. Photo Editing Software
C. Antivirus
D. Virus
Answer» E.
2826.

Which of the following is/are threats for electronic payment systems?

A. Computer virus
B. Computer worms
C. Trojan horse
D. All of the above
Answer» E.
2827.

Which of the following is associated with error detector?

A. Odd parity bit
B. Even parity bit
C. Both Odd parity bit and Even parity bit
D. None of the above
Answer» D. None of the above
2828.

Computer virus that replicates itself is called

A. bug
B. worm
C. vaccine
D. bomb
Answer» C. vaccine
2829.

Backup of the source data can be created

A. on the same device
B. on another device
C. at some other location
D. all of these
Answer» E.
2830.

A virus that migrates freely within a large population of unauthorized email user is called a -------

A. macro
B. flame war
C. plagiarism
D. worm
Answer» B. flame war
2831.

In a computer, Torjan Horse is a/an

A. anti virus
B. virus
C. software
D. hardware
Answer» C. software
2832.

Most computer crimes are committed by

A. hackers
B. international spies
C. highly paid computer consultants
D. web designers
Answer» B. international spies
2833.

Remote backup site is sometimes called the

A. primary site
B. secondary site
C. ternary site
D. main site
Answer» C. ternary site
2834.

In a computer, McAfee is a/an

A. virus
B. anti virus
C. hacker
D. worm
Answer» C. hacker
2835.

Key logger is a

A. Antivirus
B. Spyware
C. Firmware
D. All of the above
Answer» C. Firmware
2836.

Technique which can be used to optimize backed up data space is

A. encryption
B. compression
C. deduplication
D. Both b and c
Answer» E.
2837.

Viruses which executes when computer starts is

A. macro
B. file infector
C. boot sector
D. salami shaving
Answer» D. salami shaving
2838.

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called?

A. Time Bomb
B. Cracker
C. Keylogger
D. Worm
Answer» E.
2839.

Social engineering is:

A. A website created for people who share common interests.
B. Scams distributed through email such as phishing, pharming and impersonation.
C. A targeted attack on a personal computer.
D. None
Answer» C. A targeted attack on a personal computer.
2840.

A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.

A. Macro Virus
B. Stealth virus
C. Polymorphic Virus
D. Parasitic Virus
Answer» E.
2841.

Access control is granted to users after qualifying for

A. Authorization
B. Authentication
C. Cryptography
D. Regular expressions
Answer» C. Cryptography
2842.

Both email attachments and downloaded files can spread malware.

A. True
B. False
C. Maybe
D. None
Answer» B. False
2843.

If you receive an e-mail offering to remove you from a mailing list, what should you do?

A. Do not respond
B. Call the local police
C. Respond promptly
D. Wait a week to see if the offer is repeated
Answer» B. Call the local police
2844.

A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.

A. polymorphic engine
B. multiple engine
C. mutual engine
D. mutation engine
Answer» E.
2845.

A deadlock exists in a system if and only if the wait for graph

A. has a cycle in it
B. has a path from first node to last node
C. is a tree
D. has a layout in it
Answer» B. has a path from first node to last node
2846.

A worm is...

A. A slimy pink thing that lives in dirt
B. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
C. An unsolicited email message.
D. None
Answer» C. An unsolicited email message.
2847.

All of the following are biometric techniques except

A. badge
B. retina
C. face
D. palm print
Answer» E.
2848.

Secret words or numbers used for protection of devices is called

A. biometrics data
B. backup
C. passwords
D. private words
Answer» D. private words
2849.

When computer virus starts to impact the data, it is known as

A. virus infection
B. virus spreading
C. data losing
D. shutting down
Answer» B. virus spreading
2850.

For computer system's security a total approach involves

A. Internal security
B. External security
C. Demanded security
D. Both a and b
Answer» E.