ICICI Bank Probationary Officer 2010
Computer Awareness Sample Solved Questions
1. In a survey of more than 500 companies and government agencies, _____percent detected computer security breaches.
2. The survey showed that these businesses lost more than ____due to security breaches.
- $100,000 each
- $377 million
- five employees each
- $1 million
3. The typical computer criminal is a(n):
- young hacker.
- trusted employee with no criminal record.
- trusted employee with a long, but unknown criminal record.
- overseas young cracker.
4. The majority of computer crimes are committed by:
- hackers.
- insiders.
- overseas criminals.
- young teenage computer geniuses.
5. The common name for the crime of stealing passwords is:
- spooling.
- identity theft.
- spoofing.
- hacking.
6. Collecting personal information and effectively posing as another individual is known as the crime of:
- spooling.
- identity theft.
- spoofing.
- hacking.
7. Malicious software is known as:
- badware.
- malware.
- maliciousware.
- illegalware.
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
- worm.
- Trojan horse.
- virus.
- macro virus.
9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
- Trojan horse.
- virus.
- time bomb.
- time-related bomb sequence.
10. In 1999, the Melissa virus was a widely publicized:
- e-mail virus.
- macro virus.
- Trojan horse.
- Time bomb.
11. What type of virus uses computer hosts to reproduce itself?
- Time bomb
- Worm
- Melissa virus
- Macro virus
12. The thing that eventually terminates a worm virus is a lack of:
- memory or disk space.
- time.
- CD drive space.
- CD-RW.
13. When a logic bomb is activated by a time-related event, it is known as a:
- time-related bomb sequence.
- virus.
- time bomb.
- Trojan horse.
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
- time-related bomb sequence.
- virus.
- time bomb.
- Trojan horse.
15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
- A virus
- Spybot
- Logic bomb
- Security patch
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
- more complicated.
- more difficult.
- easier.
- slower.
17. HTML viruses infect:
- your computer.
- a Web page in the HTML code.
- both a Web page and the computer that is viewing it.
- No
18. Software programs that close potential security breaches in an operating system are known as:
- security breach fixes.
- refresh patches.
- security repairs.
- security patches.
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
- a virus.
- a Trojan horse.
- cracking.
- a denial of service attack.
20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
- Biometrics
- Biomeasurement
- Computer security
- Smart weapon machinery
21. What is the most common tool used to restrict access to a computer system?
- User logins
- Passwords
- Computer keys
- Access-control software
22. The most common passwords in the U.S. or Britain include all EXCEPT:
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
- hacker-proof program.
- firewall.
- hacker-resistant server.
- encryption safe wall.
24. The scrambling of code is known as:
- encryption.
- a firewall.
- scrambling.
- password-proofing.
25. If you want to secure a message, use a(n):
- cryptology source.
- encryption key.
- encryption software package.
- cryptosystem.
0 comments:
Post a Comment