Bank of Baroda PO Exam Paper – Computer General Awareness 2010

1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B

3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B

4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B

5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B

7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B

10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A

11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B

12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C

17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No

18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A

21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B

24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A

25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography

26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D

27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B

28. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B

29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B

31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B

32. Creating strong computer security to prevent computer crime usually simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A

33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D

34. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D

35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B

Fill in the Blank:

36. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging


37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

39. ____________ is the most common form of computer crime.
Answer: Theft

40. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft

41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

42. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

43. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus

44. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

45. ____________ programs search for and eliminate viruses.
Answer: Antivirus

46. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free

47. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

48. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking

49. DoS stands for ___________.
Answer: denial of service

50. DDoS stands for ___________.
Answer: distributed denial of service

51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

52. ___________ software monitors and records computer transactions.
Answer: Audit-control

53. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

54. PGP stands for ___________.
Answer: Pretty Good Privacy

55. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID

56. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments


[ad#336×280]

Sorapedia

Career, Jobs & Trending News

Recent Posts

Supreme Court Admit Writ Petition of B.Ed. Candidates in Bihar Teacher Recruitment

Supreme Court Admit Writ Petition of B.Ed. Candidates in Bihar Teacher Recruitment case - The…

1 year ago

Bihar BPSC Teacher Exam Answer Key, Cutoff & Details

BPSC has conducted the teacher vacancy recruitment exam on 24th & 25th of Aug 2023.…

1 year ago

Discussion – KVS Librarian Cut Off Marks For 2023

Discussion on KVS Librarian Cut Off Marks recruitment exams. The answer key and response sheet…

2 years ago

Google layoffs 453 Indian Employees

Google layoffs 453 Indian Employees from various departments in India. Google CEO Sundar Pichai had sent…

2 years ago

Disney to Lay off 3.6% of Workforce

Disney to Lay off 7,000 Employees to restructure their business and an effort to save…

2 years ago

Dell to Lay off 6,650 Employees

Dell to Lay off 6,650 Employees form it's PC division - Computer manufacturer Dell has…

2 years ago