GK Today - India's Trusted Hub For General Knowledge & Current Affairs Mock Test

GK Today Hindi - Sarkari Result, Govt Jobs Info & GK Updates

JENE Entrance Exam IT (Computer) Part -1

Posted: 8 days ago
JENE Entrance Exam IT (Computer) Part -1

JENE IT PART - 01.jpg

computer mcq,computer gk,computer,computer mcq for competitive exams,computer mcq in hindi,computer mcq questions,important computer mcq,computer fundamental mcq,computer mcq questions in english,computer mcqs,computer gk mcq,computer basic mcq,top mcq computer gk,top important computer mcq,computer networking mcq,computer gk questions,computer questions and answers,computer mcq questions and answers,computer mcq gk questions and answers

Advertisement

JENE Entrance Exam IT (Computer) Part -1

Duration:- 15 Minutes



Q1. ___________hardware device is used for sniffing purposes.

  • (A) Switch
  • (B) Hub
  • (C) router
  • (D) Ethernet convertor

Q2. Which one is not a security guideline for the internet?

  • (A) Internet must be accessed from a computer specially earmarked for it.
  • (B) Keep accurate record of internet access.
  • (C) Install a Dial-up Modem on your office computer.
  • (D) None of these

Q3. _________are attackers that are not a trusted member of the target organization.

  • (A) Unstructured threats
  • (B) Structured threats
  • (C) External threats
  • (D) Internal threats

Q4. _______examples of non-observance of security measures by computer users?

  • (A) Poor password management.
  • (B) Accounting of removable magnetic media.
  • (C) Good administration of networks.
  • (D) None of these.

Q5. The typical PC is _____ to the quality of its electrical power source.

  • (A) Sensitive
  • (B) Response
  • (C) Ideal
  • (D) Requires

Q6. One of the methods of attacking a computer network is______________.

  • (A) Password sniffing
  • (B) No IP spoofing
  • (C) No port scanning
  • (D) none of these

Q7. HTTP works on----------------------port.

  • (A) 25
  • (B) 80
  • (C) 81
  • (D) 110

Q8. ______________automated process that looks for open networking ports.

  • (A) Port scanning
  • (B) Ethernet scanning
  • (C) Serial port scanning
  • (D) None of these

Q9. Firewall is used to control the flow of_________.

  • (A) Information
  • (B) Data
  • (C) Patches
  • (D) Traffic

Q10. ___________can be disguised to appear as harmless or even beneficial for the computer.

  • (A) Trojan horses
  • (B) Viruses
  • (C) Worms
  • (D) None of them
Ads

Q11. __________is the method of defending a computer network.

  • (A) DDoS
  • (B) Honey pots
  • (C) Buffer over flow
  • (D) port scannig

Q12. ____________Software used for encryption and secure deletion of files and folders.

  • (A) Secure Desk
  • (B) Truecyrpt
  • (C) Secure keeper
  • (D) Zone alarm

Q13. A personal firewall is a piece of____________that resides on an individual workstation primarily to protect that workstation.

  • (A) Hardware
  • (B) Program
  • (C) Instruction
  • (D) software

Q14. __________is the typical cyber attack in a computer network.

  • (A) Honey pots
  • (B) IP Spoofing
  • (C) Anti spoofing
  • (D) firewall

Q15. Hacker uses multiple computers to carry out a DoS attack is called_________.

  • (A) DDoS
  • (B) DoS
  • (C) Sniffing
  • (D) Spoofing

Q16. ________________________security guidelines for the internet.

  • (A) Do official work on the internet computer
  • (B) Install a Dial-up Modem on your office computer
  • (C) Locate the internet computer in a separate access
  • (D) None of them.

Q17. ___________are attackers that are less trusted members of the target organization with some degree of access.

  • (A) Unstructured threats
  • (B) Structured threats
  • (C) External threats
  • (D) Internal threats

Q18. ___________ Provides encrypted access from outside a network.

  • (A) VPN
  • (B) L3 Switch
  • (C) Firewall
  • (D) L2 Switch

Q19. __________. Tools that scan a network periodically for holes/open gateways.

  • (A) Vulnerability Scanners
  • (B) Firewalls
  • (C) Trojan Horse
  • (D) Spyware

Q20. _____________Encrypt files and folders containing sensitive information.

  • (A) Avast
  • (B) Secure Desk
  • (C) Secure keeper
  • (D) None of them
Ads

Q21. Designers and users of large _______ systems have long been aware of the need to provide security and privacy for these systems.

  • (A) Automated data processing (ADP)
  • (B) Automated digital processing (ADP)
  • (C) Automated data policy (ADP)
  • (D) Automated data privacy (ADP)

Q22. CERT stands for ____.

  • (A) Computer emergency response team
  • (B) Common errase repair team
  • (C) Comn east reaction team
  • (D) Computer emergency reserve team

Q23. __________is the dynamic defensive system in a computer network.

  • (A) IDS
  • (B) Trojan Horse
  • (C) Firewall
  • (D) None of them

Q24. ___________is not the dynamic defensive system in a computer network.

  • (A) IDS
  • (B) Firewall
  • (C) IPS
  • (D) Honey pots

Q25. Programs and files can similarly be protected by _____ which plays a major role in prevention of disturbances.

  • (A) Passwords
  • (B) Lock
  • (C) Firewall
  • (D) Filter

Q26. One of the possible loopholes in a computer network is___________.

  • (A) Password protection
  • (B) No password protection
  • (C) Use of antivirus
  • (D) Use of firewall

Q27. Spyware is a_______________.

  • (A) Hardware
  • (B) Software
  • (C) Skin ware
  • (D) None of these.

Q28. _______________dummy objects used to attract attacks.

  • (A) Honey Pots
  • (B) DoS
  • (C) DDoS
  • (D) Sniffing

Q29. ____________are individual or small groups of attackers who rely on readymade tools and published vulnerabilities.

  • (A) Unstructured threats
  • (B) Structured threats
  • (C) External threats
  • (D) Internal threats

Q30. _____________ is attackers that are not a trusted member of the target's organization.

  • (A) External threats
  • (B) Internal threats
  • (C) Simple threats
  • (D) None of them
Ads

JENE Entrance Exam IT (Computer) Part -1

Duration:- 15 Minutes



Advertisement
About Author
author image

Vikas

Hello friends, myself Vikas. I am graduate and currently serving as a soldier. As the Writer and Founder of this blog, I share valuable information related to Current Affairs, Online Tests, and Test Series through this website.

Related Post:-
Advertisement