Explore topic-wise MCQs in Computer Fundamentals.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

1.

An attack in which the site is not capable of answering valid request.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» C. E-mail bombing
2.

A program that copies itself.

A. Worm
B. Virus
C. Trojan
D. Bomb
Answer» B. Virus
3.

A small program that changes the way a computer operates.

A. Worm
B. Trojan
C. Bomb
D. Virus
Answer» E.
4.

A_PROGRAM_THAT_COPIES_ITSELF.?$

A. Worm
B. Virus
C. Trojan
D. Bomb
Answer» B. Virus
5.

An attack in which the site is not capable of answering valid request.$

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» C. E-mail bombing
6.

A small program that changes the way a computer operates?

A. Worm
B. Trojan
C. Bomb
D. Virus
Answer» E.
7.

A program created by Farmer and Venema for auditing capability.

A. SAAS
B. SATAN
C. SAN
D. SAT
Answer» C. SAN
8.

A person who enjoys learning details about computers and how to enhance their capabilities.

A. Cracker
B. Hacker
C. App controller
D. Site controller
Answer» C. App controller
9.

The protocol designed to make the security of wireless LAN as good as that of wired LAN.

A. WTLS
B. WEP
C. RSN
D. WP
Answer» C. RSN
10.

WTLS stands for?

A. Wireless Transport Security Layer
B. Wireless Transfer System Layer
C. Wireless Transfer Security Layer
D. Wireless Transport System Layer
Answer» B. Wireless Transfer System Layer
11.

A process of making the encrypted text readable again.

A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Answer» B. Encryption
12.

An algorithm used in encryption is referred to as cipher.

A. True
B. False
Answer» B. False
13.

The process of transforming plain text into unreadable text.

A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Answer» C. Network Security