Chitika

Friday 30 September 2011

Quiz 09 | Computer Awareness for IBPS - Part 9

1. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software

2. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.

3. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.

4. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.

5. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.

6. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.

7. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS

8. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.

9. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys

10. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking

Answers
1. B
2. D
3. B
4. A
5. D
6. D
7. B
8. B
9. C
10. B

No comments:

Post a Comment