Tuesday, 30 May 2017

Computer Security Questions for NICL AO 2017

 Dear Readers,


Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment's Mains Examination. Practice with Computer questions for NICL AO 2017 Examination.

Q. Which among the following add clicking malware created a buzz around the world with affecting millions of Android device users?
(a) WannaCry
(b) Judy
(c) Diva
(d) TrickBot
(e) RIG Exploit Kit

Q2. The recent outbreak of ransomware caused frenzy worldwide. Through which cryptocurrency was the attacker asking the victims to pay ransom in order to get back their encrypted files?
(a) Ethereum
(b) Dash
(c) Litecoin
(d) Bitcoin
(e) Siacoin

Q3. Which among the following is true regarding computer worms?
(a) These programs have the ability to replicate themselves.
(b) Their replicating nature consumes hard drive space, thus slow down the machine.
(c) They are attached to an executable file, which means they may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file.
(d) Only (a) and (b)
(e) All of the above

Q4. Asymmetric cryptography, also known as public key cryptography, uses __________ and _________ keys to encrypt and decrypt data.
(a) pattern, coder
(b) coder, user
(c) public, private
(d) hypo, hyper
(e) lock, coder

Q5. Which among the following is not a malware?
(a) VMware
(b) Bots
(c) Adware
(d) Rootkits
(e) Spam

Q6. Which among the following technology can be used for an effective online backup of data?
(a) Space
(b) Sun
(c) Rain
(d) Tree
(e) Cloud

Q7. Which among the following is the act of hacking a website or computer network in an effort to convey a social or political message?
(a) Spamming
(b) Hacktivism
(c) Phising
(d) Hacking
(e) Spoofing

Q8. Which term refers to a group of computers controlled without their owners’ knowledge and used to send spam or make denial of service attacks?
(a) Botnet
(b) Back Door
(c) Logic Bomb
(d) Piggybacking
(e) Wiretapping

Q9. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting

Q10. The type of threats on the security of a computer system or network are:
i) Interruption   ii) Interception     iii) Modification
iv) Creation       v) Fabrication 
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v

Q11. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True

Q12. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these

Q13. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these

Q14. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these

Q15. The first Computer Virus is __________.
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these



CRACK IBPS PO 2017



11000+ (RRB, Clerk, PO) Candidates were selected in IBPS PO 2016 from Career Power Classroom Programs.


9 out of every 10 candidates selected in IBPS PO last year opted for Adda247 Online Test Series.

No comments:

Post a Comment