Prev 1 2 3 4 5 Next
21. Unsolicited commercial email is known as ____.
A. Spam
B. Malware
C. Virus
D. Spyware
ANSWER:A
SOLUTION: Alternatively referred to as mass e-mail marketing, UCE (unsolicited commercial e-mail) and bulk e-mail, spam (not the meat product) is slang that describes junk e-mail on the Internet.
22. Which virus spreads in application software?
A. Macro virus
B. Boot virus
C. File virus
D. Antivirus
ANSWER:A
SOLUTION:A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word. It centers on software applications and does not depend on the operating system (OS). As a result, it can infect any computer running any kind of OS, including Windows, macOS and Linux.
23. Unauthorized access in a network ____ issue.
A. Performance
B. Reliability
C. Security
D. None of the above
ANSWER:C
SOLUTION:An unauthorized user is a network Security issue.
24. Digilocker is _____.
A. It is digital lock to our system
B. It is digital lock to mobile apps
C. It is storage insurance & verification docs DL & vehicle reg of the road transport ministry.
D. None of these
ANSWER:C
SOLUTION: DigiLocker is an online platform that provides a seamless and paperless solution for storing a variety of documents, including income and academic certificates, government-issued ID cards, driving licences, vehicle registration certificates, and more.
25. What happens to your data is when it is encrypted?
A. It is transferred to a third party, encoded, then sent back
B. It is compressed, renamed and achieved
C. It is recorded to retain privacy from third parties
D. None of these
ANSWER: C
SOLUTION: Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
26. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as _______
A. Black Hat hackers
B. White Hat Hackers
C. Grey Hat Hackers
D. Red Hat Hackers
ANSWER:B
SOLUTION: White hat hackers, also known as ethical security hackers, identify and fix vulnerabilities. Hacking into systems with the permission of the organizations they hack into, white hat hackers try to uncover system weaknesses in order to fix them and help strengthen overall internet security.3
27. ___ is a branch of information technology known as information security.
A. Computer security
B. Cyber security
C. IT security
D. All of these
ANSWER:D
SOLUTION:Information security, also known as cyber security, is a branch of information technology that protects systems and networks from malicious attacks.
28. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ____.
A. Authentication
B. Automation
C. Firewall
D. Encryption
ANSWER:A
SOLUTION: Authentication enables organizations to keep their networks secure by permitting only authenticated users or processes access to protected resources.
29. The main reason to encrypt a file is to ____.
A. Reduce its size
B. Secure it for transmission
C. Prepare it for backup
D. Include it in the start-up sequence
ANSWER:D
SOLUTION: Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
