1. If your computer rebooting itself then it is likely that ..[SBI Clerk 2012]
(1) It has a virus
(2) It does not have enough memory
(3) There is no printer
(4)There has been a power surge
(5) It need a CD-ROM
2. Junk E-mail is also called [Union Bank of India 2011
(1) spam
(2) spoof
(3) sniffer script
(4) spool
(5) None of these
3. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a Allahabad Bank PO 2011]
(1) spammer
(2) hacker
(3) instant messenger
(4) All of these
(5) None of these
4. Vendor created program modifications are called [Allahabad Bank PO 2011]
(1) patches
(2) anti-viruses
(3) hales
(4) fixes
(5) overlaps
5. A…..is anything that can cause harm.
(1) vulnerability
(2) phishing
(3) threat
(4) spoof
(5) None of these
6. A….. is a small program embeded inside of a GIF image.
(1) web bug
(2) cookie
(3) spyware application
(4) spam
(5) None of these above
7.A hacker contacts your phone or E-mails and mpts to acquire your password is called
(1) spoofing
(2) phishing
(3) spamming
(4) buging
(5) None of these
8.the phrase……… describes viruses, worms, trojan horse attack applets and attack scripts.
(1) malware
(2) spam
(3) phishing
(4) virus
(5) None of these
9. Hackers often gain entry to a network be pretending to be at a legitimate computer
(1) spoofing
(2) forging
(3) IP spoofing
(4) None of these
10. The …… of a threat measures its potential impact on a system [IBPS Clerk 2011)
(1) vulnerabilities
(2) counter measures
(4) susceptibility
(3) degree of harm
(5) None of these
11. The main reason to encrypt a file is to
(1) reduce its size
(2) secure it for transmission
(3) prepare it for backup
(4) include it in the start-up sequence
(5) None of the above
12. A digital signature is [SBI Clerk 2011]
(1) scanned signature
(2) signature in binary form
(3) encrypting information
(4) handwritten signature
(5) None of the above
13. Mechanism to protect network from outside attack is
(1) firewall
(2) anti-virus
(3) digital signature
(4) formatting
(5) None of these
14. A firewall operated by [SBI Clerk 2010]
(1) the pre-purchase phase
(2) isolating intranet from extranet
(3) screening packets to/from the network and provide controllable filtering of network traffic
(4) All of the above
(5) None of the above
15. Which one of the following is a cryptographic protocol used to secure http connection? [RBI PO 2009]
(1) Stream Control Transmission Protocol (SCTP)
(2) Transport Layer Security (TLS)
(3) Explicit Congestion Notification (ECN)
(4) Resource Reservation Protocol (RRP)
(5) None of the above
16. …. Are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO 2011]
(1) Phishing triks
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) Phishing scams
17. …. is a form of virus explicitly designed to hide itself from detection by anti-virus software.
(1) Stealth virus
(2) Polymorphic virus
(3) Parasitic virus
(4) Macro virus
(5) None of these
18. All of the following are examples of real-security and privacy risks except [SBI PO 2011)
(1) hackers
(2) spam
(3) viruses
(4) identify theft
(5) None of these
19. The first PC virus was developed in
(1) 1980
(2) 1984
(3) 1986
(4) 1988
(5) 1987
20. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ? [IBPS Clerk 2010)
(1) Spoofing
(2) Phishing
(3) Stalking
(9) Hacking
(5) None of these
21. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself? [SBI PO 2011]
(1) Trojan horse
(2) Logic bomb
(3) Cracker
(4) Firewall
(5) None of these
22. Abuse messaging systems to send unsolicited is
(1) phishing
(2) spam
(3) malware
(4) firewall
(5) adware
23. …. are often delivered to PC through an E-mail attachment and are often designed to do harm.
(1) Viruses
(2) Spam
(4) Email messages
(3) Portals
(5) None of these
24. Which one of the following is a key function firewall? [SBI PO 2010
]
(1) Monitoring
(2) Deleting
(3) Copying
(4) Moving
(5) None of these
25. Viruses, trojan horses and worms are [IBPS Clerk 2012]
(1) able to harm computer system
(2) unable to detect if present on computer
(3) user-friendly applications
(4) harmless applications resident on computer
(5) None of the above
26. Computer virus is (IBPS Clerk 2011
(1) a hardware
(2) windows tool
(3) a computer program
(4) a system software
(5) None of the above
27. The first computer virus is
(1) creeper
(2) PARAM
(3) the famous
(4) HARLIE
(5) None of these
28. A time bomb occurs during a particular
(1) data or time
(2) logic and data
(3) only time
(4) All of the above
(5) None of these
29. First boot sector virus is
(1) computed
(2) mind
(3) brain
(4) Elk Cloner
(5) None of these
30. Which virus spre in application software?
(1) Macro virus
(2) Boot virus
(3) File virus
(4) Anti-virus
(5) None of the above
31. Some viruses have a delayed payload, which sometimes called a
(1) time
(2) anti-virus
(3) bomb
(4) All of these
(5) None of these
32. An anti-virus is a
(1) program code
(2) computer
(3) company name
(4) application software
(5) None of the above
33. Trend Micro’ is a
(1) virus program
(2) anti-virus software
(3) just a program
(4)All of these
(5) None of the above
34. It is a self-replicating program that infects computer and spre by inserting copies of itself into other executable code or documents.
(1) Keylogger
(2) Worm
(3) Virus
(4) Cracker
(5) None of the above
35. Like a virus, it is a self-replicating program. It also propagates through computer network.
(1) Spyware
(2) Worm
(3) Cracker
(4) phishing scam
(5) None of these
36. What is an E-main attachment?
(1) A receipt sent by the recipient
(2) A separate document from another program sent along with an E-mail
message
(3) A malicious parasite that feeds off your messages and destroys the contents
(4) A list of Cc : or Bcc : recipients
(5) A friend to whom E-mail is sent regularly
37. Passwords enables users to
(1) get into the system quickly
(9) make efficient use of time
(3) retain confidentiality of files
(4) simplify file structure
(5) None of the above
38. A program designed to destroy data on your computer which can travel to infect other computers, is called a
(1) disease
(2) tarpedo
(3) hurricave
(4) virus
(5) None of these