Latest Banking jobs   »   Computer Security Questions for NICL AO...

Computer Security Questions for NICL AO 2017

 Dear Readers,

Computer Security Questions for NICL AO 2017 |_2.1
Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment’s Mains Examination. Practice with Computer questions for NICL AO 2017 Examination.

Q. Which among the following add clicking malware created a buzz around the world with affecting millions of Android device users?
(a) WannaCry
(b) Judy
(c) Diva
(d) TrickBot
(e) RIG Exploit Kit

Q2. The recent outbreak of ransomware caused frenzy worldwide. Through which cryptocurrency was the attacker asking the victims to pay ransom in order to get back their encrypted files?
(a) Ethereum
(b) Dash
(c) Litecoin
(d) Bitcoin
(e) Siacoin

Q3. Which among the following is true regarding computer worms?
(a) These programs have the ability to replicate themselves.
(b) Their replicating nature consumes hard drive space, thus slow down the machine.
(c) They are attached to an executable file, which means they may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file.
(d) Only (a) and (b)
(e) All of the above


Q4. Asymmetric cryptography, also known as public key cryptography, uses __________ and _________ keys to encrypt and decrypt data.
(a) pattern, coder
(b) coder, user
(c) public, private
(d) hypo, hyper
(e) lock, coder


Q5. Which among the following is not a malware?
(a) VMware
(b) Bots
(c) Adware
(d) Rootkits
(e) Spam


Q6. Which among the following technology can be used for an effective online backup of data?
(a) Space
(b) Sun
(c) Rain
(d) Tree
(e) Cloud

Q7. Which among the following is the act of hacking a website or computer network in an effort to convey a social or political message?
(a) Spamming
(b) Hacktivism
(c) Phising
(d) Hacking
(e) Spoofing


Q8. Which term refers to a group of computers controlled without their owners’ knowledge and used to send spam or make denial of service attacks?
(a) Botnet
(b) Back Door
(c) Logic Bomb
(d) Piggybacking
(e) Wiretapping


Q9. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting


Q10. The type of threats on the security of a computer system or network are:
i) Interruption   ii) Interception     iii) Modification
iv) Creation       v) Fabrication 
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v

Q11. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True


Q12. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these


Q13. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these


Q14. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these

Q15. The first Computer Virus is __________.
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these

CRACK IBPS PO 2017



11000+ (RRB, Clerk, PO) Candidates

were selected in IBPS PO 2016 from

Career Power Classroom Programs.



9 out of every 10 candidates

selected in IBPS PO last year opted

for Adda247 Online Test Series.

Leave a comment

Your email address will not be published. Required fields are marked *