

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.
1. |
An attack in which the user receives unwanted amount of e-mails. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» D. Ping storm | |
2. |
A technique in which a program attacks a network by exploiting IP broadcast addressing operations. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» B. Denial of service | |
3. |
Attack in which a user creates a packet that appears to be something else. |
A. | Smurfing |
B. | Trojan |
C. | E-mail bombing |
D. | Spoofing |
Answer» E. | |
4. |
A_TECHNIQUE_IN_WHICH_A_PROGRAM_ATTACKS_A_NETWORK_BY_EXPLOITING_IP_BROADCAST_ADDRESSING_OPERATIONS.?$ |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» B. Denial of service | |
5. |
An_attack_in_which_the_user_receives_unwanted_amount_of_e-mails.$ |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» D. Ping storm | |
6. |
Attack in which a user creates a packet that appears to be something else? |
A. | Smurfing |
B. | Trojan |
C. | E-mail bombing |
D. | Spoofing |
Answer» E. | |
7. |
A malicious code hidden inside a seemingly harmless piece of code. |
A. | Worm |
B. | Bomb |
C. | Trojan Horse |
D. | Virus |
Answer» D. Virus | |
8. |
An indirect form of surveillance. |
A. | Honey pot |
B. | Logical |
C. | Security |
D. | Intrusion |
Answer» B. Logical | |
9. |
Creating a computer or paper audit that can help detect wrong doings. |
A. | Auditing |
B. | Validation |
C. | RSN |
D. | Verification |
Answer» B. Validation | |
10. |
Study of creating a d using encryption and decryption techniques. |
A. | Cipher |
B. | Cryptography |
C. | Encryption |
D. | Decryption |
Answer» C. Encryption | |
11. |
A unique piece of information that is used in encryption. |
A. | Cipher |
B. | Plain Text |
C. | Key |
D. | Cipher |
Answer» D. Cipher | |
12. |
Plain text is the data after encryption is performed. |
A. | True |
B. | False |
Answer» C. | |
13. |
A cipher in which the order is not preserved. |
A. | Polyalphabetic substitution based |
B. | Transposition-based |
C. | Substitution based |
D. | Public key based |
Answer» C. Substitution based | |