

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.
1. |
An attack in which the site is not capable of answering valid request. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» C. E-mail bombing | |
2. |
A program that copies itself. |
A. | Worm |
B. | Virus |
C. | Trojan |
D. | Bomb |
Answer» B. Virus | |
3. |
A small program that changes the way a computer operates. |
A. | Worm |
B. | Trojan |
C. | Bomb |
D. | Virus |
Answer» E. | |
4. |
A_PROGRAM_THAT_COPIES_ITSELF.?$ |
A. | Worm |
B. | Virus |
C. | Trojan |
D. | Bomb |
Answer» B. Virus | |
5. |
An attack in which the site is not capable of answering valid request.$ |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» C. E-mail bombing | |
6. |
A small program that changes the way a computer operates? |
A. | Worm |
B. | Trojan |
C. | Bomb |
D. | Virus |
Answer» E. | |
7. |
A program created by Farmer and Venema for auditing capability. |
A. | SAAS |
B. | SATAN |
C. | SAN |
D. | SAT |
Answer» C. SAN | |
8. |
A person who enjoys learning details about computers and how to enhance their capabilities. |
A. | Cracker |
B. | Hacker |
C. | App controller |
D. | Site controller |
Answer» C. App controller | |
9. |
The protocol designed to make the security of wireless LAN as good as that of wired LAN. |
A. | WTLS |
B. | WEP |
C. | RSN |
D. | WP |
Answer» C. RSN | |
10. |
WTLS stands for? |
A. | Wireless Transport Security Layer |
B. | Wireless Transfer System Layer |
C. | Wireless Transfer Security Layer |
D. | Wireless Transport System Layer |
Answer» B. Wireless Transfer System Layer | |
11. |
A process of making the encrypted text readable again. |
A. | Decryption |
B. | Encryption |
C. | Network Security |
D. | Information Hiding |
Answer» B. Encryption | |
12. |
An algorithm used in encryption is referred to as cipher. |
A. | True |
B. | False |
Answer» B. False | |
13. |
The process of transforming plain text into unreadable text. |
A. | Decryption |
B. | Encryption |
C. | Network Security |
D. | Information Hiding |
Answer» C. Network Security | |