Explore topic-wise MCQs in Computer Fundamentals.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

1.

An attack in which the user receives unwanted amount of e-mails.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» D. Ping storm
2.

A technique in which a program attacks a network by exploiting IP broadcast addressing operations.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» B. Denial of service
3.

Attack in which a user creates a packet that appears to be something else.

A. Smurfing
B. Trojan
C. E-mail bombing
D. Spoofing
Answer» E.
4.

A_TECHNIQUE_IN_WHICH_A_PROGRAM_ATTACKS_A_NETWORK_BY_EXPLOITING_IP_BROADCAST_ADDRESSING_OPERATIONS.?$

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» B. Denial of service
5.

An_attack_in_which_the_user_receives_unwanted_amount_of_e-mails.$

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» D. Ping storm
6.

Attack in which a user creates a packet that appears to be something else?

A. Smurfing
B. Trojan
C. E-mail bombing
D. Spoofing
Answer» E.
7.

A malicious code hidden inside a seemingly harmless piece of code.

A. Worm
B. Bomb
C. Trojan Horse
D. Virus
Answer» D. Virus
8.

An indirect form of surveillance.

A. Honey pot
B. Logical
C. Security
D. Intrusion
Answer» B. Logical
9.

Creating a computer or paper audit that can help detect wrong doings.

A. Auditing
B. Validation
C. RSN
D. Verification
Answer» B. Validation
10.

Study of creating a d using encryption and decryption techniques.

A. Cipher
B. Cryptography
C. Encryption
D. Decryption
Answer» C. Encryption
11.

A unique piece of information that is used in encryption.

A. Cipher
B. Plain Text
C. Key
D. Cipher
Answer» D. Cipher
12.

Plain text is the data after encryption is performed.

A. True
B. False
Answer» C.
13.

A cipher in which the order is not preserved.

A. Polyalphabetic substitution based
B. Transposition-based
C. Substitution based
D. Public key based
Answer» C. Substitution based