Important Questions on Computer Security IBPS SBI Set 22

Important Questions on Computer Security IBPS SBI Set 22

Ads

Computer Awareness Test Questions and Answers

Hello Readers, Today we are sharing Basic Computer Questions completely based on SBI/IBPS PO and Clerk Exam pattern 2017 - 2018. computer knowledge questions and answers, computer questions for competitive exams pdf download, basic computer knowledge test, computer awareness for SSC RBI RRB SBI IBPS PO Clerk pdf.

These basic computer quiz questions with answers are very important for SBI PO exam and IBPS PO & other upcoming banking exams.

Following are some computer fundamentals questions and answers multiple choice which is likely to be asked/ already asked in competitive exams. Following basic computer questions will help you securing good marks in upcoming SBI PO, SBI Clerk, IBPS PO­ VII, IBPS Clerk­ VII, IBPS RRB Exams.

Objective Computer Questions Quiz

1). An error in computer program is called: 
1. Hacking
2. Virus
3. Bug
4. Worm
5. None of These

2). ______was the first technique that posed a serious threat to virus scanners: 
1. Vulnerability Code
2. Polymorphic Code
3. Antimorphic Code
4. Monomorphic Code
5. None of These

3). A/an  ______ is a system susceptibility or flaw: 
1. Error
2. Vulnerability
3. Virus
4. Bug
5. None of These

4). _______vulnerability is one for which at least one working attack exists:?
1. Democratic
2. Exploitable
3. Dominative
4. Both (a) and (b)
5. None of These

5). CVE stands for: 
1. Common Vulnerabilities Exposures
2. Cyber Vulnerabilities Exposures
3. Cycolic Vulnerabilities Exposures
4. Common Virus Exposures
5. None of These

6). _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network:
1. Hacking
2. Cracking
3. Viruses
4. Spoofing
5. None of These

7). ISP refers to:
1. Information Security Policy
2. Internet Security Policy
3. Internal Security Policy
4. Intelect Security Policy
5. None of These

8). _____is a computer program that is loaded into a computer without the owner's knowledge:
1. Hack Material
2. Viruses
3. Both of Above
4. Threats
5. None of These

9). Which among the following is correct regarding the Boot Sector Viruses:
1. These viruses are resides in the boot sector of a floppy or hard disk.
2. Such viruses are activated every time a computer boots from an infected disk.
3. Virus remains in memory until an uninfected floppy disk is inserted into the floppy drive.
4. All of the Above
5. None of These

10). _______viruses infect executable program files:
1. File Infector Viruses
2. Macro Viruses
3. Multi Partite Viruses
4. None of These
5. Both (a) and (b)

11). _____ infections have cost more money and taken more time to repair than any other virus type:
1. File Infector Viruses
2. Multi Partite Viruses
3. Macro Viruses
4. None of These
5. Both (a) and (b)

12). _____was virus first appeared on Friday, March 26, 1999 and spread all over the world faster than any virus seen before:
1. 9 Melissa
2. 10 Melissa
3. 99 Melissa
4. 11 Melissa
5. None of These

13). 9 Melissa was a _____macro virus:
1. Microsoft Word
2. Microsoft Excel
3. Internet
4. Microsoft Power Point
5. None of These

14). A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program:
1. Trojan Horses
2. Worms
3. Macro Viruses
4. Threats
5. None of These

What Others Are Reading
15). Which among the following is correct about the Antivirus Programs:
1. They contain a database of signatures for all known viruses and worms
2. The software searches a computer for the presence of these signatures
3. Both of Above
4. None of These
5. Threats

Computer Quiz Questions With Answer

1. 3   2. 2   3. 2   4. 2   5. 1   6. 1   7. 1   8. 2   9. 4   10. 1   11. 3   12. 1   13. 1   14. 1   15. 3