Bank Exams Exam  >  Bank Exams Tests  >  IBPS PO Prelims & Mains Preparation  >  Test: Computer Security - 2 - Bank Exams MCQ

Test: Computer Security - 2 - Bank Exams MCQ


Test Description

10 Questions MCQ Test IBPS PO Prelims & Mains Preparation - Test: Computer Security - 2

Test: Computer Security - 2 for Bank Exams 2024 is part of IBPS PO Prelims & Mains Preparation preparation. The Test: Computer Security - 2 questions and answers have been prepared according to the Bank Exams exam syllabus.The Test: Computer Security - 2 MCQs are made for Bank Exams 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Computer Security - 2 below.
Solutions of Test: Computer Security - 2 questions in English are available as part of our IBPS PO Prelims & Mains Preparation for Bank Exams & Test: Computer Security - 2 solutions in Hindi for IBPS PO Prelims & Mains Preparation course. Download more important topics, notes, lectures and mock test series for Bank Exams Exam by signing up for free. Attempt Test: Computer Security - 2 | 10 questions in 10 minutes | Mock test for Bank Exams preparation | Free important questions MCQ to study IBPS PO Prelims & Mains Preparation for Bank Exams Exam | Download free PDF with solutions
Test: Computer Security - 2 - Question 1

Which of the following computer viruses hijack the system when it boots and deletes data?

Detailed Solution for Test: Computer Security - 2 - Question 1

An operating system process-attacking computer virus that is disguised from standard anti-virus or anti-malware scans is known as a stealth virus. Stealth viruses are skilled at purposefully avoiding detection by hiding in files, partitions, and boot sectors.

Test: Computer Security - 2 - Question 2

Junk E-mail is also called as __________.

Detailed Solution for Test: Computer Security - 2 - Question 2

Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Test: Computer Security - 2 - Question 3

________ are upgrades to the software and operating systems (OS) that fix security flaws in a program or product.

Detailed Solution for Test: Computer Security - 2 - Question 3

Patches are upgrades to the software and operating systems (OS) that fix security flaws in a program or product.

Test: Computer Security - 2 - Question 4

________________ is a piece of software made to keep track of (log) each keystroke made on the computer it is running on.

Detailed Solution for Test: Computer Security - 2 - Question 4

Keylogger is a piece of software made to keep track of (log) each keystroke made on the computer it is running on.

Test: Computer Security - 2 - Question 5

A private communication, such as a phone call, instant message, videoconference, or fax transmission, can be intercepted in real-time without the intended recipient's knowledge and is known as _______________.

Detailed Solution for Test: Computer Security - 2 - Question 5

Private communication, such as a phone call, instant message, videoconference, or fax transmission, can be intercepted in real-time without the intended recipient's knowledge and is known as eavesdropping.

Test: Computer Security - 2 - Question 6

Installing a ______________ is a good way to safeguard yourself from computer hacker attacks.

Detailed Solution for Test: Computer Security - 2 - Question 6

Installing a firewall is a good way to safeguard yourself from computer hacker attacks.

Test: Computer Security - 2 - Question 7

A __________ is a group of computer programs, usually malicious, that is used to gain unauthorized access to computers or parts of its software. They frequently conceal their own or other programs' presence.

Detailed Solution for Test: Computer Security - 2 - Question 7

A rootkit is a group of computer programs, usually malicious, that is used to gain unauthorized access to computers or parts of its software. They frequently conceal their own or other programs' presence.

Test: Computer Security - 2 - Question 8

________ are people's attempts to trick you into giving them your personal information by pretending to be someone else.

Detailed Solution for Test: Computer Security - 2 - Question 8

Phishing scams are people's attempts to trick you into giving them your personal information by pretending to be someone else.

Test: Computer Security - 2 - Question 9

A ___________ is someone who utilizes their knowledge to break into someone else's computers to steal information or do harm.

Detailed Solution for Test: Computer Security - 2 - Question 9

A hacker is someone who utilizes their knowledge to break into someone else's computers to steal information or do harm.

Test: Computer Security - 2 - Question 10

_____________is a type of fraud in which a perpetrator uses email or other forms of contact to pose as a reliable organization or individual.

Detailed Solution for Test: Computer Security - 2 - Question 10

Phishing is a type of fraud in which a perpetrator uses email or other forms of contact to pose as a reliable organization or individual.

544 videos|686 docs|263 tests
Information about Test: Computer Security - 2 Page
In this test you can find the Exam questions for Test: Computer Security - 2 solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Computer Security - 2, EduRev gives you an ample number of Online tests for practice

Top Courses for Bank Exams

544 videos|686 docs|263 tests
Download as PDF

Top Courses for Bank Exams