Labels

Wednesday, 25 June 2014

ICICI Bank Probationary Officer 2010 Computer Awareness Sample Solved Questions

ICICI Bank Probationary Officer 2010 
Computer Awareness Sample Solved Questions

1. In a survey of more than 500 companies and government agencies, _____percent detected computer security breaches.
  • 20
  • 75
  • 85
  • 99
2. The survey showed that these businesses lost more than ____due to security breaches.
  • $100,000 each
  • $377 million
  • five employees each
  • $1 million
3. The typical computer criminal is a(n):
  • young hacker.
  • trusted employee with no criminal record.
  • trusted employee with a long, but unknown criminal record.
  • overseas young cracker.
4. The majority of computer crimes are committed by:
  • hackers.
  • insiders.
  • overseas criminals.
  • young teenage computer geniuses.
5. The common name for the crime of stealing passwords is:
  • spooling.
  • identity theft.
  • spoofing.
  • hacking.
6. Collecting personal information and effectively posing as another individual is known as the crime of:
  • spooling.
  • identity theft.
  • spoofing.
  • hacking.
7. Malicious software is known as:
  • badware.
  • malware.
  • maliciousware.
  • illegalware.
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
  • worm.
  • Trojan horse.
  • virus.
  • macro virus.
9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
  • Trojan horse.
  • virus.
  • time bomb.
  • time-related bomb sequence.
10. In 1999, the Melissa virus was a widely publicized:
  • e-mail virus.
  • macro virus.
  • Trojan horse.
  • Time bomb.
11. What type of virus uses computer hosts to reproduce itself?
  • Time bomb
  • Worm
  • Melissa virus
  • Macro virus
12. The thing that eventually terminates a worm virus is a lack of:
  • memory or disk space.
  • time.
  • CD drive space.
  • CD-RW.
13. When a logic bomb is activated by a time-related event, it is known as a:
  • time-related bomb sequence.
  • virus.
  • time bomb.
  • Trojan horse.
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
  • time-related bomb sequence.
  • virus.
  • time bomb.
  • Trojan horse.
15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
  • A virus
  • Spybot
  • Logic bomb
  • Security patch
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
  • more complicated.
  • more difficult.
  • easier.
  • slower.
17. HTML viruses infect:
  • your computer.
  • a Web page in the HTML code.
  • both a Web page and the computer that is viewing it.
  • No
18. Software programs that close potential security breaches in an operating system are known as:
  • security breach fixes.
  • refresh patches.
  • security repairs.
  • security patches.
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
  • a virus.
  • a Trojan horse.
  • cracking.
  • a denial of service attack.
20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
  • Biometrics
  • Biomeasurement
  • Computer security
  • Smart weapon machinery
21. What is the most common tool used to restrict access to a computer system?
  • User logins
  • Passwords
  • Computer keys
  • Access-control software
22. The most common passwords in the U.S. or Britain include all EXCEPT:
  • love.
  • Fred.
  • God.
  • 123.
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
  • hacker-proof program.
  • firewall.
  • hacker-resistant server.
  • encryption safe wall.
24. The scrambling of code is known as:
  • encryption.
  • a firewall.
  • scrambling.
  • password-proofing.
25. If you want to secure a message, use a(n):
  • cryptology source.
  • encryption key.
  • encryption software package.
  • cryptosystem.

0 comments:

Post a Comment