Computer Quiz – 76

Dear Aspirants,

Computer Quiz is the basic part of competitive exams. It is the scoring subject and also the easiest one so we give advice to Bank Aspirants to grasp these questions. It is a series of Computer MCQs.

1. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators?
a) Rootkit
b) Keylogger
c) Worm
d) Cracker

Click here to View Answer
Answer a) Rootkit

2.People often call as the brain of computer system?
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit

Click here to View Answer
Answer c) Central Processing Unit

3. Rootkit is?
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

Click here to View Answer
Answer b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

4. The terminal device that functions as a cash register, computer terminal, and OCR reader is the?
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal

Click here to View Answer
Answer d) POS terminal

5. A set of flip flops integrated together is called?
a) Counter
b) Adder
c) Register
d) None of the above

Click here to View Answer
Answer c) Register

6. Packet Sniffer is?
a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.
b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general descriptionof a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
d) None of these

Click here to View Answer
Answer a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.

7. White hat is?
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking
for exploits so they can be closed.
d) None of these

Click here to View Answer
Answer a) hacker breaks security for altruistic or at least non-malicious reasons.

8.The value of each bead in heaven is?
a) 1
b) 3
c) 5
d) 7

Click here to View Answer
Answer c) 5

9. Blue hat is?
a) hacker breaks security for altruistic or at least non-malicious reasons.
b) hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking
for exploits so they can be closed.
d) None of these

Click here to View Answer
Answer c) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking
for exploits so they can be closed.

10.Mnemonic a memory trick is used in which of the following language?
a) Machine language
b) Assembly language
c) High level language
d) None of above

Click here to View Answer
Answer b) Assembly language

Leave a Comment