CSS multiple-choice questions for AKTU Examination and another competitive exam
Here we are going to discuss top 50 CSS multiple choice questions. these questions will help you at the many places like in examinations. in an interview etc. So lets start--
1. What type of symmetric key algorithm using a streaming cipher to encrypt information? A. RC4 B. Blowfish C. SHA D. MD5 Ans-A
2. Charles Babbage invented A. ENIAC B. Difference Engine C. Electronic Computer D. Punched Card Ans-B
3. What type of attack uses a fraudulent server with a relay address? A. NTLM B. MITM C. NetBIOS D. SMB Ans-(B)
4. What is the maximum character Linux supports in its filenames? A. 8 B. 128 C. 256 D. Unlimited Ans:-C
5. Which of the following is independent malicious program that need not any host program? A. Trap doors B. Trojan horse C. Virus D. Worm Ans:-D
6. In tunnel mode IPsec protects the A. Entire IP packet B. IP header C. IP payload D. None of the mentioned Ans:-A
7. A Extensible authentication protocol is authentication framework frequently used in A. Wired personal area network B. Wireless networks C. Wired local area network D. None of the mentioned Ans:-B
8. Which of the following is known as Malicious software? A. illegalware B. Badware C. Malware D. Maliciousware Ans:-C
9. Which of the following is NOT an example of a smartcard? A. a credit card which can be used to operate a mobile phone B. an electronic money card e.g Mondex C. a drivers licence containing current information about bookings etc D. an access control card containing a digitised photo Ans:-D
10. Code red is an ---------- A. Word Processing Software B. Antivirus C. Virus D. Photo Editing Software Ans:-C
11.Firewalls are to protect against (A) Virus Attacks (B) Fire Attacks (C) Data Driven Attacks (D) Unauthorized Attacks Ans:-D
12.The first computer virus is (A) The famous (B) HARLIE (C) PARAM (D) Creeper Ans:-D
13.A hard copy would be prepared on a (A) Printer (B) Joystick (C) Trackball (D) All of these Ans:-A
14.The first PC virus was developed in (A) 1980 (B) 1986 (C) 1988 (D) 1999 Ans:-B
16.Joystick allows the movements with (A) 90 degree angle (B) 180 degree angle (C) 360 degree angle (D) 45 degree angle Ans:- C
17.To protect system, there is how many levels of security level? (A) One (B) Two (C) Three (D) Four Ans:- C
18.Lowest level of security system is (A) A (B) B (C) C (D) D Ans:- A
19.The security of a system can be improved by (A) Audit log (B) Threat monitoring (C) Both (a) and (b) (D) None of these Ans:- B
20.How many capabilities in CAP? (A) One (B) Two (C) Three (D) Four Ans:- B
21.CAP is (A) Simple and greater power than that of hydra (B) Complex and less powerful than that of hydra (C) Simpler and less powerful than that of hydra (D) None of these Ans:- C
22.Which one of the following is a key function of firewall? (A) Copying (B) Moving (C) Deleting (D) Monitoring Ans:- D
23.Which memory is nonvolatile and may be written only once? (A) PROM (B) RAM (C) EP-ROM (D) SRAM Ans:- D
24.Unauthorized copying of software to be used for personal gain of personal backups is called (A) Program looting (B) Program thievery (C) Data snatching (D) Software piracy Ans:- D
25.Like a virus , it is a self-replicating program it also propagates through computer network (A) Phishing scam (B) Worm (C) Spyware (D) Cracker Ans:- A
26.Multiple processor configurations (A) Are very efficient, but only on some applications (B) Work equally well on all applications (C) Are less efficient than scalar configurations (D) Are more efficient than scalar configurations Ans:- A
27.Applications (A) Must usually be re-complied to use multiple processors (B) Can always be made efficient on multiple processors (C) Immediately run on multiple processors (D) Cannot run on multiple processors Ans:- A
28.Seeks analysis is (A) Only shown on real-time displays (B) Used for analyzing control-unit busy problems (C) Used for analyzing device busy problems (D) Used for analyzing paging problems Ans:- C
29.The most common security failure is (A) Depending on passwords (B) Carelessness by users (C) Too much emphasis on preventing physical access (D) Insufficient technology used to prevent breaches Ans:- D
30.Trojan-Horse programs (A) Usually are immediately discovered (B) Really do not usually work (C) Are hacker programs that do not show up on the system (D) Are legitimate programs that allow unauthorized access Ans:- D
31.First boot sector virus is (A) Computed (B) Mind (C) Brain (D) Elk cloner Ans:- C
32.The linking of computers with a communication system is called (A) Assembling (B) Interlocking (C) Pairing (D) Networking Ans:- D
34.Abuse messaging systems to send unsolicited is (A) Phishing (B) Adware (C) Firewall (D) Spam Ans:- D
35.A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a (A) Hacker (B) Analyst (C) Spammer (D) Programmer Ans:- A
36.Malicious access are unauthorized (A) Destruction of data (B) Modification of data (C) Reading of data (D) All of these Ans:- C
37.Encrypted passwords are used for (A) Security purpose (B) Passwords list secret (C) Faster execution (D) Both (a) and (b) Ans:- D
38.A firewall (A) Separates a network into multiple domains (B) May need to allow http to pass (C) Limits network access between the two security domains and maintains and logs all connections (D) is a computer or router that sits between the trusted and untrusted Ans:- A
39.Link encryption (A) Is used only to detect errors (B) Cannot be used in a large network (C) Is less secure than end-to-end encryption (D) Is more secure than end-to-end encryption Ans:- C
40.A high paging rate (A) Always creates a slow system (B) Is a symptom of too much processor activity (C) Keeps the system running well (D) May also cause a high I/O rate Ans:- D
41.A program designed to destroy data on your computer which can travel to “infect” other computers is called a _____ (A) Virus (B) Disease (C) Hurricane (D) Torpedo Ans:- A
42._____ are often delivered to PC through an E-mail attachment and are often designed to do harm. (A) Email messages (B) Portals (C) Spam (D) Viruses Ans:- C
43.A hacker contacts your phone or E-mails and attempts to acquire your password is called (A) Spamming (B) Bugging (C) Spoofing (D) Phishing Ans:- D
44.Hackers often gain entry to a network be pretending to be at a legitimate computer (A) IP spoofing (B) Forging (C) Spoofing (D) None of these Ans:- A
45.Some viruses have delayed payload, which is sometimes called a (A) Bomb (B) Anti-virus (C) Time (D) All of these Ans:- A
46.The most difficult problem with co-processors is (A) Keeping all processors busy (B) Managing shared resources (C) Finding suitable applications (D) Cost Ans:- A
47.Opportunity for misuse when (A) Program written by one user and used by another user (B) Program written by one user (C) Program used by another user (D) None of these Ans:- A
48.Main motto of CAP system is (A) System provides him with no library of procedures to be used (B) Use of software capability has allowed them to relative considerable economics in formulating and implementing protection policies (C) Both (a) and (b) (D) None of these Ans:- C
49.Resources are managed (A) By sophisticated locking mechanisms (B) More easily with multiple processors (C) By only one processor (D) With each processor equally Ans:- A
50.Control-unit busy (A) Can be prevented with more devices (B) Can be prevented by reducing the paging rate (C) Shows the availability of the path of devices (D) Is the same as device busy Ans:- C
The Casino is open in Phoenix - KTNV The Casino 사천 출장샵 will provide gambling, dining, entertainment and shopping at its location in 군산 출장샵 Las Vegas. Tickets and information 안성 출장안마 will be available at the Jan 6, 2022The Pool After DarkJan 7, 2022The 서산 출장안마 ChainsmokersJan 9, 2022Lionel 안동 출장안마 Richie
1 Comments
The Casino is open in Phoenix - KTNV
ReplyDeleteThe Casino 사천 출장샵 will provide gambling, dining, entertainment and shopping at its location in 군산 출장샵 Las Vegas. Tickets and information 안성 출장안마 will be available at the Jan 6, 2022The Pool After DarkJan 7, 2022The 서산 출장안마 ChainsmokersJan 9, 2022Lionel 안동 출장안마 Richie