CUET Humanities Exam  >  CUET Humanities Tests  >  Test: Security Aspects - 1 - CUET Humanities MCQ

Test: Security Aspects - 1 - CUET Humanities MCQ


Test Description

10 Questions MCQ Test - Test: Security Aspects - 1

Test: Security Aspects - 1 for CUET Humanities 2024 is part of CUET Humanities preparation. The Test: Security Aspects - 1 questions and answers have been prepared according to the CUET Humanities exam syllabus.The Test: Security Aspects - 1 MCQs are made for CUET Humanities 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Security Aspects - 1 below.
Solutions of Test: Security Aspects - 1 questions in English are available as part of our course for CUET Humanities & Test: Security Aspects - 1 solutions in Hindi for CUET Humanities course. Download more important topics, notes, lectures and mock test series for CUET Humanities Exam by signing up for free. Attempt Test: Security Aspects - 1 | 10 questions in 10 minutes | Mock test for CUET Humanities preparation | Free important questions MCQ to study for CUET Humanities Exam | Download free PDF with solutions
Test: Security Aspects - 1 - Question 1

Which of the following terms best describes malware?

Detailed Solution for Test: Security Aspects - 1 - Question 1

A threat is any agent, condition, or circumstance that could potentially cause harm, loss, or damage.

Test: Security Aspects - 1 - Question 2

'Computer virus' is a

Detailed Solution for Test: Security Aspects - 1 - Question 2

'Computer virus' is a destructive program.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Test: Security Aspects - 1 - Question 3

Which of the below statements is/are wrong?

  1. Computer virus is not a complete program by itself.
  2. Computer worm is a complete program.
  3. Computer worm can operate independently.
  4. Computer viruses cause direct harm to the system by corrupting codes as well as data.

Detailed Solution for Test: Security Aspects - 1 - Question 3

Computer virus is not a complete program.This is made intentionally to harm the system. Virus may be present in a system but it may be inactive. it becomes active when it has suitable condition. Computer virus is independent and harms the system. Computer worm is a complete program which cannot work independently. It just goes on consuming the resources. Thus, statement 1 is right but 3 is wrong.

Test: Security Aspects - 1 - Question 4

Choose the option which describes the virus 'Trojan horse'.

Detailed Solution for Test: Security Aspects - 1 - Question 4

Trojan horse fools a user to download and/or execute applications by pretending to be useful.

Test: Security Aspects - 1 - Question 5

What is Adware?

Detailed Solution for Test: Security Aspects - 1 - Question 5

Adware is any software application in which advertising banners are displayed while a program is running.

Test: Security Aspects - 1 - Question 6

Unsolicited commercial e-mail is commonly known as

Detailed Solution for Test: Security Aspects - 1 - Question 6

UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's request or consent. In the vernacular, this kind of e-mail message is called spam.

Test: Security Aspects - 1 - Question 7

Which of the following programs uses a variety of different approaches to identify and eliminate spam?

Detailed Solution for Test: Security Aspects - 1 - Question 7

Various anti-spam techniques are used to prevent e-mail spam. Anti-spam program is a program that uses a variety of different approaches to identify and eliminate spam. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by e-mail administrators, those that can be automated by e-mail senders and those employed by researchers and law enforcement officials.
So, option 2 anti spam prograrm is the answer.

Test: Security Aspects - 1 - Question 8

A packet filter firewall filters at the ...

Detailed Solution for Test: Security Aspects - 1 - Question 8

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

Test: Security Aspects - 1 - Question 9

What is meant by denial of service?

Detailed Solution for Test: Security Aspects - 1 - Question 9

Denial of service (DoS) is a type of cyber attack designed to disable, shut down or disrupt a network, website or service. Typically, a malware is used to interrupt or inhibit the normal flow of data into and out of a system to render the target useless or inaccessible for a certain period.

Test: Security Aspects - 1 - Question 10

Which of the following is false about denial-of-service (DDoS) attack?

Detailed Solution for Test: Security Aspects - 1 - Question 10

SQL injection attack gains malicious access to resources, applications or databases. DDoS attack does not exploit database. In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Information about Test: Security Aspects - 1 Page
In this test you can find the Exam questions for Test: Security Aspects - 1 solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Security Aspects - 1, EduRev gives you an ample number of Online tests for practice

Top Courses for CUET Humanities

Download as PDF

Top Courses for CUET Humanities