Computer security (also known as cyber security or IT security) is information security as applied to computing devices such as computers and smart phones, as well as computer networks such as private and public network including the whole Internet. Traditionally, computer facilities have been physically protected for three reasons: • To prevent theft of or damage to the hardware • To prevent theft of or damage to the information • To prevent disruption of service

 1.Passwords enable users to- [SBI Clerk, 2009]

(a) get into the system quickly (b) make efficient use of time (c) retain confidentiality of files (d) simplify file structures (e) None of these

Ans. C

2.A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a [IBPS PO, 2011]

(a)hacker(b) analyst (c) instant messenger (d) programmer (e) spammer

Ans. A

3._ “are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS PO, 2011]

(a) Phishing trips (b) Computer viruses (c) Spyware scams (d) Viruses (e) Phishing scams

Ans. A

4.Why is it unethical to share copyrighted files with your friends? [IBPS PO, 2011]

(a) It is not unethical, because it is legal. (b) It is unethical because the files are being given for free. (c) Sharing copyrighted files without permission breaks copyright laws. (d) It is not unethical because the files arebeing given for free. (e) It is not unethical – anyone can access a computer

Ans. C

5.You can protect sensitive data from prying eyes using [IBPS Clerk, 2012]

(a) Encryption (b) Passwords (c) File locks (d) File permissions(e) None of these

Ans. D

6.If your computer keeps rebooting itself, then it is likely that [SBI Clerk, 2012]

(a)It has a virus (b) It does not have enough memory (c) There is no printer (d) There has been a power surge (e) It needs a CD-ROM

Ans.A

7.Why is it unethical to share copyrighted files with your friends? [IBPS Clerk, 2014]

(a) It is not unethical, because it is legal. (b) It is unethical because the files are being given for free. (c) Sharing copyrighted files without permission breaks copyright laws. (d)

Ans.C

8.It is not unethical because the files are being given for free. (e) It is not unethical – anyone can access a computer Which of the following is a program that uses a variety of different approaches to identify and eliminate spam ? [IBPS Clerk, 2014]

(a) Directory search (b) Anti-spam program (c) Web server (d) Web storefront creation package (e) Virus

Ans.B

9.A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a ___. [IBPS Clerk, 2014]

(a) hacker (b) analyst – (c) instant messenger (d) programmer (e) spammer

Ans.A

10.are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS Clerk, 2014]

(a) Phishing trips (b) Computer viruses (c) Spyware scams (d) Viruses (e) Phishing scams

Ans.A

11.Accessing an unsecured Wi-Fi network from your current location without authorization is called [SBI Clerk, 2014]

(a) Hacking (b) War Driving (c) Wi-Fi Piggybacking (d) All of the above (e) None of these

Ans.C

12.A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access is called [SBI Clerk, 2014]

(a) Malware (b) Botnet (c) Worm (d) Motherboard (e) Firewall

Ans.E

13.An unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed is known as [SBI Clerk, 2014]

(a) Digital Certificate (b) Hacking (c) Pharming (d) Error! Not a valid embedded object. Dot Con (e) Digital Signature

Ans.E

14.All of the following are examples of real security and privacy risks EXCEPT: [IBPS Clerk, 2015]

(a) Viruses (b) Hackers (c) Spam (d) Identity theft (e) None of these

Ans.C

15.In IT, the technique of delaying outgoing acknowledgements temporarily is known as

(a) AR Acknowledgement [SSC CGL, 2016] (b) AR request (c) Piggybacking (d) Piggyframing

Ans.C

16.The scrambling of code is known as: [IBPS Clerk Mains, 2016]

(a) Encryption (b) Firewalling (c) Scrambling (d) Deception (e) Permuting

Ans.A

17.An act of sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information? [IBPS Clerk Mains, 2016]

(a) Phishing (b) Spam (c) Hacking (d) Cracking (e) Malware

Ans.A

18.Which of the following is the type of software that has self-replicating software that causes damage to files and system? [IBPS Clerk Mains, 2016]

(a) Viruses (b) Trojan horses (c) Bots(d) Worms (e) Backdoors

Ans.D

19.The conversation of electronic data into another form is called [IBPS RRB, 2016]

(a) Biometrics (b) Encryption (c) Compression (d) Encapsulation (e) None of these

Ans.B

20.It is the process in which control information is added to a data packet as it moves through the layers of a communication module is termed as [IBPS RRB, 2016 ]

(a) Encapsulation (b) Encryption (c) Decryption (d) Coding (e) None of these

Ans.A

 

Get more important gk topic
in your mailbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Leave a Reply