UCAT Exam  >  UCAT Tests  >  Test: Direct Comprehension & Fact-Based Questions - 1 - UCAT MCQ

Test: Direct Comprehension & Fact-Based Questions - 1 - UCAT MCQ


Test Description

20 Questions MCQ Test - Test: Direct Comprehension & Fact-Based Questions - 1

Test: Direct Comprehension & Fact-Based Questions - 1 for UCAT 2025 is part of UCAT preparation. The Test: Direct Comprehension & Fact-Based Questions - 1 questions and answers have been prepared according to the UCAT exam syllabus.The Test: Direct Comprehension & Fact-Based Questions - 1 MCQs are made for UCAT 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Direct Comprehension & Fact-Based Questions - 1 below.
Solutions of Test: Direct Comprehension & Fact-Based Questions - 1 questions in English are available as part of our course for UCAT & Test: Direct Comprehension & Fact-Based Questions - 1 solutions in Hindi for UCAT course. Download more important topics, notes, lectures and mock test series for UCAT Exam by signing up for free. Attempt Test: Direct Comprehension & Fact-Based Questions - 1 | 20 questions in 10 minutes | Mock test for UCAT preparation | Free important questions MCQ to study for UCAT Exam | Download free PDF with solutions
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 1

Ransomware attacks encrypt critical systems, demanding payment for access. In 2023, a ransomware attack on Vestas, a Danish wind turbine manufacturer, halted operations of 3,000 turbines for two weeks. The attack, exploiting outdated software, cost $15 million in recovery and lost revenue. Globally, 25% of energy firms faced ransomware in 2024, per a cybersecurity report. Phishing emails, used in 60% of attacks, trick employees into downloading malware. Mitigation includes regular software updates, adopted by 70% of firms, reducing attack success by 30%. Backups, maintained by 50% of companies, restored 80% of affected systems. Public awareness campaigns, reaching 55% of employees, emphasize email vigilance. Regulations, enforced in 65% of countries, mandate cybersecurity audits. Developing nations, with 40% of global energy infrastructure, lag in protection, with only 20% of firms compliant. Advanced encryption, used in 30% of systems, prevents unauthorized access. Costs per attack average $10 million across the sector.
How many wind turbines were affected by the 2023 ransomware attack on Vestas?

Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 1
The passage states, "halted operations of 3,000 turbines," confirming Option B. Options A, C, and D are incorrect as they do not match the stated number.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 2

Ransomware attacks encrypt critical systems, demanding payment for access. In 2023, a ransomware attack on Vestas, a Danish wind turbine manufacturer, halted operations of 3,000 turbines for two weeks. The attack, exploiting outdated software, cost $15 million in recovery and lost revenue. Globally, 25% of energy firms faced ransomware in 2024, per a cybersecurity report. Phishing emails, used in 60% of attacks, trick employees into downloading malware. Mitigation includes regular software updates, adopted by 70% of firms, reducing attack success by 30%. Backups, maintained by 50% of companies, restored 80% of affected systems. Public awareness campaigns, reaching 55% of employees, emphasize email vigilance. Regulations, enforced in 65% of countries, mandate cybersecurity audits. Developing nations, with 40% of global energy infrastructure, lag in protection, with only 20% of firms compliant. Advanced encryption, used in 30% of systems, prevents unauthorized access. Costs per attack average $10 million across the sector.
What was the financial cost of the Vestas ransomware attack?

Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 2
The passage states, "cost $15 million in recovery and lost revenue," confirming Option C. Options A, B, and D are incorrect as they do not match the stated amount.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 3

Ransomware attacks encrypt critical systems, demanding payment for access. In 2023, a ransomware attack on Vestas, a Danish wind turbine manufacturer, halted operations of 3,000 turbines for two weeks. The attack, exploiting outdated software, cost $15 million in recovery and lost revenue. Globally, 25% of energy firms faced ransomware in 2024, per a cybersecurity report. Phishing emails, used in 60% of attacks, trick employees into downloading malware. Mitigation includes regular software updates, adopted by 70% of firms, reducing attack success by 30%. Backups, maintained by 50% of companies, restored 80% of affected systems. Public awareness campaigns, reaching 55% of employees, emphasize email vigilance. Regulations, enforced in 65% of countries, mandate cybersecurity audits. Developing nations, with 40% of global energy infrastructure, lag in protection, with only 20% of firms compliant. Advanced encryption, used in 30% of systems, prevents unauthorized access. Costs per attack average $10 million across the sector.
What percentage of energy firms faced ransomware attacks in 2024?

Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 3
The passage states, "25% of energy firms faced ransomware in 2024," confirming Option B. Options A, C, and D are incorrect as they do not match the stated percentage.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 4
Ransomware attacks encrypt critical systems, demanding payment for access. In 2023, a ransomware attack on Vestas, a Danish wind turbine manufacturer, halted operations of 3,000 turbines for two weeks. The attack, exploiting outdated software, cost $15 million in recovery and lost revenue. Globally, 25% of energy firms faced ransomware in 2024, per a cybersecurity report. Phishing emails, used in 60% of attacks, trick employees into downloading malware. Mitigation includes regular software updates, adopted by 70% of firms, reducing attack success by 30%. Backups, maintained by 50% of companies, restored 80% of affected systems. Public awareness campaigns, reaching 55% of employees, emphasize email vigilance. Regulations, enforced in 65% of countries, mandate cybersecurity audits. Developing nations, with 40% of global energy infrastructure, lag in protection, with only 20% of firms compliant. Advanced encryption, used in 30% of systems, prevents unauthorized access. Costs per attack average $10 million across the sector.
What method is used in 60% of ransomware attacks to gain access?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 4
The passage states, "Phishing emails, used in 60% of attacks," confirming Option B. Options A, C, and D are incorrect as they are not mentioned as the primary method.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 5
Phishing attacks use fraudulent emails to steal credentials or install malware. In 2024, a phishing attack on Siemens Gamesa, a wind energy firm, compromised 500 employee accounts, disrupting turbine monitoring for three days. Globally, 30% of cyberattacks on energy firms are phishing-related, per a 2024 report. Training programs, adopted by 65% of companies, reduce successful attacks by 40%. Two-factor authentication, used in 50% of systems, prevents 70% of unauthorized access. Public campaigns, reaching 60% of employees, teach email verification. Developing nations, with 45% of energy infrastructure, report 20% lower training adoption. Recovery costs average $5 million per attack. Social engineering, used in 25% of phishing attacks, manipulates employees into revealing data. Regulations, enforced in 70% of countries, mandate cybersecurity training. Advanced firewalls, installed in 35% of firms, block 80% of malicious emails.
How many employee accounts were compromised in the 2024 Siemens Gamesa phishing attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 5
The passage states, "compromised 500 employee accounts," confirming Option C. Options A, B, and D are incorrect as they do not match the stated number.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 6
Phishing attacks use fraudulent emails to steal credentials or install malware. In 2024, a phishing attack on Siemens Gamesa, a wind energy firm, compromised 500 employee accounts, disrupting turbine monitoring for three days. Globally, 30% of cyberattacks on energy firms are phishing-related, per a 2024 report. Training programs, adopted by 65% of companies, reduce successful attacks by 40%. Two-factor authentication, used in 50% of systems, prevents 70% of unauthorized access. Public campaigns, reaching 60% of employees, teach email verification. Developing nations, with 45% of energy infrastructure, report 20% lower training adoption. Recovery costs average $5 million per attack. Social engineering, used in 25% of phishing attacks, manipulates employees into revealing data. Regulations, enforced in 70% of countries, mandate cybersecurity training. Advanced firewalls, installed in 35% of firms, block 80% of malicious emails.
What percentage of cyberattacks on energy firms in 2024 were phishing-related?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 6
The passage states, "30% of cyberattacks on energy firms are phishing-related," confirming Option B. Options A, C, and D are incorrect as they do not match the stated percentage.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 7
Phishing attacks use fraudulent emails to steal credentials or install malware. In 2024, a phishing attack on Siemens Gamesa, a wind energy firm, compromised 500 employee accounts, disrupting turbine monitoring for three days. Globally, 30% of cyberattacks on energy firms are phishing-related, per a 2024 report. Training programs, adopted by 65% of companies, reduce successful attacks by 40%. Two-factor authentication, used in 50% of systems, prevents 70% of unauthorized access. Public campaigns, reaching 60% of employees, teach email verification. Developing nations, with 45% of energy infrastructure, report 20% lower training adoption. Recovery costs average $5 million per attack. Social engineering, used in 25% of phishing attacks, manipulates employees into revealing data. Regulations, enforced in 70% of countries, mandate cybersecurity training. Advanced firewalls, installed in 35% of firms, block 80% of malicious emails.
What security measure prevents 70% of unauthorized access in 50% of systems?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 7
The passage states, "Two-factor authentication, used in 50% of systems, prevents 70% of unauthorized access," confirming Option C. Options A, B, and D are incorrect as they are not linked to the specific prevention rate.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 8
Phishing attacks use fraudulent emails to steal credentials or install malware. In 2024, a phishing attack on Siemens Gamesa, a wind energy firm, compromised 500 employee accounts, disrupting turbine monitoring for three days. Globally, 30% of cyberattacks on energy firms are phishing-related, per a 2024 report. Training programs, adopted by 65% of companies, reduce successful attacks by 40%. Two-factor authentication, used in 50% of systems, prevents 70% of unauthorized access. Public campaigns, reaching 60% of employees, teach email verification. Developing nations, with 45% of energy infrastructure, report 20% lower training adoption. Recovery costs average $5 million per attack. Social engineering, used in 25% of phishing attacks, manipulates employees into revealing data. Regulations, enforced in 70% of countries, mandate cybersecurity training. Advanced firewalls, installed in 35% of firms, block 80% of malicious emails.
What is the average recovery cost per phishing attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 8
The passage states, "Recovery costs average $5 million per attack," confirming Option C. Options A, B, and D are incorrect as they do not match the stated cost.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 9
Denial-of-Service (DoS) attacks overload systems, disrupting operations. In 2024, a DoS attack on Ørsted, a Danish wind energy company, disrupted data exchange for 1,500 turbines for 48 hours. Globally, 20% of energy firms faced DoS attacks, per a 2024 report. Attackers use botnets, controlling 70% of attacks, to flood servers. Mitigation includes load balancers, adopted by 60% of firms, reducing downtime by 25%. Firewalls, used in 80% of systems, block 65% of malicious traffic. Public awareness, reaching 50% of IT staff, emphasizes monitoring. Regulations, enforced in 75% of countries, mandate attack reporting. Developing nations, with 35% of energy infrastructure, report 15% lower mitigation adoption. Recovery costs average $8 million per attack. Cloud-based defenses, used in 40% of firms, prevent 50% of disruptions. DoS attacks aim to disrupt, not steal data.
How many turbines were affected by the 2024 DoS attack on Ørsted?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 9
The passage states, "disrupted data exchange for 1,500 turbines," confirming Option B. Options A, C, and D are incorrect as they do not match the stated number.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 10
Denial-of-Service (DoS) attacks overload systems, disrupting operations. In 2024, a DoS attack on Ørsted, a Danish wind energy company, disrupted data exchange for 1,500 turbines for 48 hours. Globally, 20% of energy firms faced DoS attacks, per a 2024 report. Attackers use botnets, controlling 70% of attacks, to flood servers. Mitigation includes load balancers, adopted by 60% of firms, reducing downtime by 25%. Firewalls, used in 80% of systems, block 65% of malicious traffic. Public awareness, reaching 50% of IT staff, emphasizes monitoring. Regulations, enforced in 75% of countries, mandate attack reporting. Developing nations, with 35% of energy infrastructure, report 15% lower mitigation adoption. Recovery costs average $8 million per attack. Cloud-based defenses, used in 40% of firms, prevent 50% of disruptions. DoS attacks aim to disrupt, not steal data.
What percentage of energy firms faced DoS attacks in 2024?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 10
The passage states, "20% of energy firms faced DoS attacks," confirming Option B. Options A, C, and D are incorrect as they do not match the stated percentage.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 11
Denial-of-Service (DoS) attacks overload systems, disrupting operations. In 2024, a DoS attack on Ørsted, a Danish wind energy company, disrupted data exchange for 1,500 turbines for 48 hours. Globally, 20% of energy firms faced DoS attacks, per a 2024 report. Attackers use botnets, controlling 70% of attacks, to flood servers. Mitigation includes load balancers, adopted by 60% of firms, reducing downtime by 25%. Firewalls, used in 80% of systems, block 65% of malicious traffic. Public awareness, reaching 50% of IT staff, emphasizes monitoring. Regulations, enforced in 75% of countries, mandate attack reporting. Developing nations, with 35% of energy infrastructure, report 15% lower mitigation adoption. Recovery costs average $8 million per attack. Cloud-based defenses, used in 40% of firms, prevent 50% of disruptions. DoS attacks aim to disrupt, not steal data.
What tool is used by attackers in 70% of DoS attacks?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 11
The passage states, "Attackers use botnets, controlling 70% of attacks," confirming Option C. Options A, B, and D are incorrect as they are not mentioned as the primary tool.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 12
Denial-of-Service (DoS) attacks overload systems, disrupting operations. In 2024, a DoS attack on Ørsted, a Danish wind energy company, disrupted data exchange for 1,500 turbines for 48 hours. Globally, 20% of energy firms faced DoS attacks, per a 2024 report. Attackers use botnets, controlling 70% of attacks, to flood servers. Mitigation includes load balancers, adopted by 60% of firms, reducing downtime by 25%. Firewalls, used in 80% of systems, block 65% of malicious traffic. Public awareness, reaching 50% of IT staff, emphasizes monitoring. Regulations, enforced in 75% of countries, mandate attack reporting. Developing nations, with 35% of energy infrastructure, report 15% lower mitigation adoption. Recovery costs average $8 million per attack. Cloud-based defenses, used in 40% of firms, prevent 50% of disruptions. DoS attacks aim to disrupt, not steal data.
What is the average recovery cost per DoS attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 12
The passage states, "Recovery costs average $8 million per attack," confirming Option C. Options A, B, and D are incorrect as they do not match the stated cost.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 13
Supply chain attacks exploit third-party software or hardware vulnerabilities. In 2023, an attack on Nordex, a German wind turbine firm, via a compromised supplier’s software, leaked 2 terabytes of data. Globally, 15% of energy firms faced supply chain attacks in 2024, per a cybersecurity report. Backdoors, present in 20% of third-party software, allow unauthorized access. Mitigation includes supplier audits, adopted by 55% of firms, reducing risks by 30%. Encryption, used in 60% of systems, protects 75% of data. Public awareness, reaching 50% of supply chain managers, emphasizes vetting. Regulations, enforced in 70% of countries, mandate supplier compliance. Developing nations, with 40% of supply chains, report 25% lower audit adoption. Recovery costs average $12 million per attack. Multi-factor authentication, used in 45% of firms, prevents 65% of breaches.
How much data was leaked in the 2023 Nordex supply chain attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 13
The passage states, "leaked 2 terabytes of data," confirming Option B. Options A, C, and D are incorrect as they do not match the stated amount.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 14
Supply chain attacks exploit third-party software or hardware vulnerabilities. In 2023, an attack on Nordex, a German wind turbine firm, via a compromised supplier’s software, leaked 2 terabytes of data. Globally, 15% of energy firms faced supply chain attacks in 2024, per a cybersecurity report. Backdoors, present in 20% of third-party software, allow unauthorized access. Mitigation includes supplier audits, adopted by 55% of firms, reducing risks by 30%. Encryption, used in 60% of systems, protects 75% of data. Public awareness, reaching 50% of supply chain managers, emphasizes vetting. Regulations, enforced in 70% of countries, mandate supplier compliance. Developing nations, with 40% of supply chains, report 25% lower audit adoption. Recovery costs average $12 million per attack. Multi-factor authentication, used in 45% of firms, prevents 65% of breaches.
What percentage of energy firms faced supply chain attacks in 2024?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 14
The passage states, "15% of energy firms faced supply chain attacks in 2024," confirming Option B. Options A, C, and D are incorrect as they do not match the stated percentage.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 15
Supply chain attacks exploit third-party software or hardware vulnerabilities. In 2023, an attack on Nordex, a German wind turbine firm, via a compromised supplier’s software, leaked 2 terabytes of data. Globally, 15% of energy firms faced supply chain attacks in 2024, per a cybersecurity report. Backdoors, present in 20% of third-party software, allow unauthorized access. Mitigation includes supplier audits, adopted by 55% of firms, reducing risks by 30%. Encryption, used in 60% of systems, protects 75% of data. Public awareness, reaching 50% of supply chain managers, emphasizes vetting. Regulations, enforced in 70% of countries, mandate supplier compliance. Developing nations, with 40% of supply chains, report 25% lower audit adoption. Recovery costs average $12 million per attack. Multi-factor authentication, used in 45% of firms, prevents 65% of breaches.
What mitigation measure reduces supply chain attack risks by 30%?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 15
The passage states, "supplier audits, adopted by 55% of firms, reducing risks by 30%," confirming Option B. Options A, C, and D are incorrect as they are not linked to the specific risk reduction.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 16
Supply chain attacks exploit third-party software or hardware vulnerabilities. In 2023, an attack on Nordex, a German wind turbine firm, via a compromised supplier’s software, leaked 2 terabytes of data. Globally, 15% of energy firms faced supply chain attacks in 2024, per a cybersecurity report. Backdoors, present in 20% of third-party software, allow unauthorized access. Mitigation includes supplier audits, adopted by 55% of firms, reducing risks by 30%. Encryption, used in 60% of systems, protects 75% of data. Public awareness, reaching 50% of supply chain managers, emphasizes vetting. Regulations, enforced in 70% of countries, mandate supplier compliance. Developing nations, with 40% of supply chains, report 25% lower audit adoption. Recovery costs average $12 million per attack. Multi-factor authentication, used in 45% of firms, prevents 65% of breaches.
What is the average recovery cost per supply chain attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 16
The passage states, "Recovery costs average $12 million per attack," confirming Option C. Options A, B, and D are incorrect as they do not match the stated cost.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 17
Malware, including viruses and trojans, disrupts or steals data from systems. In 2024, a malware attack on Enercon, a German wind turbine manufacturer, halted production for 10 days, costing $20 million. Globally, 35% of energy firms faced malware attacks, per a 2024 report. Trojans, used in 50% of attacks, disguise as legitimate software. Anti-malware software, adopted by 75% of firms, detects 80% of threats. Regular backups, used in 60% of systems, restore 85% of data. Public awareness, reaching 55% of employees, promotes safe downloads. Regulations, enforced in 70% of countries, mandate threat reporting. Developing nations, with 40% of infrastructure, report 20% lower anti-malware adoption. Recovery costs average $7 million per attack. Intrusion detection systems, used in 45% of firms, prevent 60% of infections.
How long was production halted in the 2024 Enercon malware attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 17
The passage states, "halted production for 10 days," confirming Option C. Options A, B, and D are incorrect as they do not match the stated duration.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 18
Malware, including viruses and trojans, disrupts or steals data from systems. In 2024, a malware attack on Enercon, a German wind turbine manufacturer, halted production for 10 days, costing $20 million. Globally, 35% of energy firms faced malware attacks, per a 2024 report. Trojans, used in 50% of attacks, disguise as legitimate software. Anti-malware software, adopted by 75% of firms, detects 80% of threats. Regular backups, used in 60% of systems, restore 85% of data. Public awareness, reaching 55% of employees, promotes safe downloads. Regulations, enforced in 70% of countries, mandate threat reporting. Developing nations, with 40% of infrastructure, report 20% lower anti-malware adoption. Recovery costs average $7 million per attack. Intrusion detection systems, used in 45% of firms, prevent 60% of infections.
What percentage of energy firms faced malware attacks in 2024?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 18
The passage states, "35% of energy firms faced malware attacks," confirming Option B. Options A, C, and D are incorrect as they do not match the stated percentage.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 19
Malware, including viruses and trojans, disrupts or steals data from systems. In 2024, a malware attack on Enercon, a German wind turbine manufacturer, halted production for 10 days, costing $20 million. Globally, 35% of energy firms faced malware attacks, per a 2024 report. Trojans, used in 50% of attacks, disguise as legitimate software. Anti-malware software, adopted by 75% of firms, detects 80% of threats. Regular backups, used in 60% of systems, restore 85% of data. Public awareness, reaching 55% of employees, promotes safe downloads. Regulations, enforced in 70% of countries, mandate threat reporting. Developing nations, with 40% of infrastructure, report 20% lower anti-malware adoption. Recovery costs average $7 million per attack. Intrusion detection systems, used in 45% of firms, prevent 60% of infections.
What type of malware is used in 50% of attacks?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 19
The passage states, "Trojans, used in 50% of attacks," confirming Option B. Options A, C, and D are incorrect as they are not mentioned as the primary type.
Test: Direct Comprehension & Fact-Based Questions - 1 - Question 20
Malware, including viruses and trojans, disrupts or steals data from systems. In 2024, a malware attack on Enercon, a German wind turbine manufacturer, halted production for 10 days, costing $20 million. Globally, 35% of energy firms faced malware attacks, per a 2024 report. Trojans, used in 50% of attacks, disguise as legitimate software. Anti-malware software, adopted by 75% of firms, detects 80% of threats. Regular backups, used in 60% of systems, restore 85% of data. Public awareness, reaching 55% of employees, promotes safe downloads. Regulations, enforced in 70% of countries, mandate threat reporting. Developing nations, with 40% of infrastructure, report 20% lower anti-malware adoption. Recovery costs average $7 million per attack. Intrusion detection systems, used in 45% of firms, prevent 60% of infections.
What is the average recovery cost per malware attack?
Detailed Solution for Test: Direct Comprehension & Fact-Based Questions - 1 - Question 20
The passage states, "Recovery costs average $7 million per attack," confirming Option C. Options A, B, and D are incorrect as they do not match the stated cost.
Information about Test: Direct Comprehension & Fact-Based Questions - 1 Page
In this test you can find the Exam questions for Test: Direct Comprehension & Fact-Based Questions - 1 solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Direct Comprehension & Fact-Based Questions - 1, EduRev gives you an ample number of Online tests for practice
Download as PDF