Monday 5 November 2012

Questions of Banking preparation : computer Affairs



Computer Affairs

1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A). 20
B). 75
C). 85
D). 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security breaches.
A). $100,000 each
B). $377 million
C). five employees each
D). $1 million
Answer: B


3. The typical computer criminal is a(n):
A). young hacker.
B). trusted employee with no criminal record.
C). trusted employee with a long, but unknown criminal record.
D). overseas young cracker.
Answer: B

4. The majority of computer crimes are committed by:
A). hackers.
B). insiders.
C). overseas criminals.
D). young teenage computer geniuses.
Answer: B

5. The common name for the crime of stealing passwords is:
A). spooling.
B). identity theft.
C). spoofing.
D). hacking.
Answer: C

6. Collecting personal information and effectively posing as another individual is known as the crime of:
A). spooling.
B). identity theft.
C). spoofing.
D). hacking.
Answer: B

7. Malicious software is known as:
A). badware.
B). malware.
C). maliciousware.
D). illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A). worm.
B). Trojan horse.
C). virus.
D). macro virus.
Answer: B


9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A). Trojan horse.
B). virus.
C). time bomb.
D). time-related bomb sequence.
Answer: B

10. In 1999, the Melissa virus was a widely publicized:
A). e-mail virus.
B). macro virus.
C). Trojan horse.
D). Time bomb.
Answer: A

11. What type of virus uses computer hosts to reproduce itself?
A). Time bomb
B). Worm
C). Melissa virus
D). Macro virus
Answer: B

12. The thing that eventually terminates a worm virus is a lack of:
A). memory or disk space.
B). time.
C). CD drive space.
D). CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A). A virus
B). Spybot
C). Logic bomb
D). Security patch
Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A). more complicated.
B). more difficult.
C). easier.
D). slower.
Answer: C

17. HTML viruses infect:
A). your computer.
B). a Web page in the HTML code.
C). both a Web page and the computer that is viewing it.
D). No

18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B). refresh patches.
C). security repairs.
D). security patches.
Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A). a virus.
B). a Trojan horse.
C). cracking.
D). a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A). Biometrics
B). Biomeasurement
C). Computer security
D). Smart weapon machinery
Answer: A

21. What is the most common tool used to restrict access to a computer system?
A). User logins
B). Passwords
C). Computer keys
D). Access-control software
Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:
A). love.
B). Fred.
C). God.
D). 123.
Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A). hacker-proof program.
B). firewall.
C). hacker-resistant server.
D). encryption safe wall.
Answer: B

24. The scrambling of code is known as:
A). encryption.
B). a firewall.
C). scrambling.
D). password-proofing.
Answer: A

25. If you want to secure a message, use a(n):
A). cryptology source.
B). encryption key.
C). encryption software package.
D). cryptosystem.
Answer: D

0 comments:

Post a Comment