RSCIT iLearn Assessment - 11
(माइक्रोसॉफ्ट वर्ड)


माइक्रोसॉफ्ट वर्ड


RSCIT iLearn Assessment - 11 - माइक्रोसॉफ्ट वर्ड.

RSCIT iLearn Assessment - माइक्रोसॉफ्ट वर्ड with answers.


RSCIT iLearn Assessment - 11 - माइक्रोसॉफ्ट वर्ड - के महत्वपूर्ण प्रश्न-उत्तर पढ़ने वाले है, वो भी उत्तर कुंजी (Answer Key) के साथ। माइक्रोसॉफ्ट वर्ड के महत्वपूर्ण प्रश्न-उत्तर देखने के लिए नीचे स्क्रॉल करे.




1  A malicious code hidden inside a seemingly harmless piece of code.

A. Worm

B. Bomb

C. Trojan Horse

D. Virus


Correct Answer - Trojan Horse



2  What is the use of firewall?

A. Filters the packets that come from internet

B. Filters the packets that come from internet to intranet

C. Filters the packet transmitted to internet

D. Ensure the packets faster traffic for fast e-commerce


Correct Answer - Filters the packets that come from internet



3  What is the keylogger in the context of password attacks?

A. Software that generates random passwords

B. Malicious software that records keystrokes on a compromised device

C. A tool for cracking password hashes

D. A type of phishing attack


Correct Answer - Malicious software that records keystrokes on a compromised device






यदि आपको RSCIT Ilearn के अन्य असाइनमेंट के महत्वपूर्ण प्रश्न उत्तर पढ़ने है तो नीचे दिये गए लिंक पर क्लिक करके पढ़ सकते है, इससे आप अच्छे अंक प्राप्त कर सकेंगे ।
RSCIT iLearn के अन्य असाइनमेंट से सम्बंधित प्रश्न पढ़ने के लिए क्लिक करें



4  What is ransomware designed to?

A. Steal personal infotmation

B. Disabble antivirus software

C. Encrypt files and demand payment for their release

D. Track user activities on the internet


Correct Answer - Encrypt files and demand payment for their release



5  Which of the following will not protect you from spam?

A. Filters

B. Popup blocker

C. E-mail rules

D. Spam blocker


Correct Answer - Popup blocker



6  What is brute force attack in the context of password security?

A. Exploiting software vulnerabilities

B. Guessing passwords through trial and error

C. Intercepting communication between device

D. Using social engineering to obtain passwords


Correct Answer - Guessing passwords through trial and error



7  Viruses which execute when computer starts is-

A. Macro

B. File infector

C. Boot sector

D. None of the above


Correct Answer - Boot sector






यदि आपको RSCIT Ilearn के अन्य असाइनमेंट के महत्वपूर्ण प्रश्न उत्तर पढ़ने है तो नीचे दिये गए लिंक पर क्लिक करके पढ़ सकते है, इससे आप अच्छे अंक प्राप्त कर सकेंगे ।
RSCIT iLearn के अन्य असाइनमेंट से सम्बंधित प्रश्न पढ़ने के लिए क्लिक करें



8  Who monitors the activity of user on internet and transmit to someone else?

A. Adware

B. Spyware

C. Malware

D. None of the above


Correct Answer - Spyware



9  When hckers flood a web site with useless traffic to overwhelm the network, it is called………….

A. a Denial of Service (DOS) attack

B. spoofing

C. pishing

D. None of the above


Correct Answer - a Denial of Service (DOS) attack



10  What is the primary goal of a credential phishing attack?

A. Installing maleware on a device

B. Intercepting passwords during transmission

C. Gaining unauthorized access to a network

D. Obtaining sensitive information, such as usernames and passwords


Correct Answer - Obtaining sensitive information, such as usernames and passwords



11  A website URL that starts with http:// and includes a padlock icon in the address bar indicates:

A. The website is using an outdated security protocol

B. The website is using a secure connection with encryption

C. The website is immune to all types of cyber threats

D. 


Correct Answer - The website is using a secure connection with encryption






यदि आपको RSCIT Ilearn के अन्य असाइनमेंट के महत्वपूर्ण प्रश्न उत्तर पढ़ने है तो नीचे दिये गए लिंक पर क्लिक करके पढ़ सकते है, इससे आप अच्छे अंक प्राप्त कर सकेंगे ।
RSCIT iLearn के अन्य असाइनमेंट से सम्बंधित प्रश्न पढ़ने के लिए क्लिक करें



12  What is phishing in the context of cybersecurity?

A. A type of malware

B. Unauthorized access to a system

C. An attempt to trick individuals into revealing sensitive information

D. 


Correct Answer - An attempt to trick individuals into revealing sensitive information



13  What is a person called when they try to hurt a group of people with the use of a computer?

A. Cracker

B. Social engineer

C. Cyber terroist

D. White hat intruder


Correct Answer - Cyber terroist



14  Which Computer virus records every movement you make on your computer?

A. Dos

B. Malware Android

C. Trapper

D. Keylogger


Correct Answer - Keylogger



15  Study of creating and using encryption and decryption techniques?

A. Cipher

B. Cryptography

C. Encryption

D. Decryption


Correct Answer - Cryptography



16  Which of the following is independent malicious program that need not any host program?

A. Virus

B. Logic Bomb

C. Worm

D. Trap doors


Correct Answer - Worm



17  What is purpose of regularly clearing browser cache and cookies for secure browsing?

A. Enhancing website performance

B. Deleting saved documents

C. Preventig website from tracking activities

D. Disabling browser extensions


Correct Answer - Preventig website from tracking activities



18  Malicious program that does not replicate autometically is-

A. Trojan horse

B. Worm

C. Zombie

D. Virus


Correct Answer - Trojan horse



19  ………..are computer program that are designed by attackers to gain root or administrative access to your computer.

A. Backdoors

B. Rootkits

C. Malware

D. Antiware


Correct Answer - Rootkits



20  What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

A. Cracker

B. Worm

C. Trojan Horse

D. Keylogger


Correct Answer - Trojan Horse



21  Which of the following is the type of software that has self-replicating software that causes damage to files and system?

A. Viruses

B. Trojan horses

C. Bots

D. Worms


Correct Answer - Viruses



22  What does the presence of www in website URL signify?

A. The website is more trustworthy

B. The website is using outdated technology

C. The website is less secure

D. It is just a naming convention and does not affect security


Correct Answer - It is just a naming convention and does not affect security



23  Which of the following is a common security feature found in reputable online payment portals?

A. Requesting payment in cryptocurrency only

B. Using HTTP instead of HTTPS

C. Two- factor authentication

D. Display pop-up ads during the payment process


Correct Answer - Two- factor authentication



24  Which of the following is a class of computer threat?

A. Phishing

B. Soliciting

C. Stalking

D. DOS attacks


Correct Answer - DOS attacks



25  Which type of attack involves sending deceptive e-mails to trick individuals into revealing sensitive information, including passwords?

A. Brute force attack

B. Phishing attack

C. Dictionary attack

D. Rainbow table attack


Correct Answer - Phishing attack



26  Unsolicited commercial e-mail are also called-

A. Spyware

B. Malware

C. Spam

D. Virus


Correct Answer - Spam



27  The attackers a network of compromised devices known as-

A. D-net

B. Internet

C. Botnet

D. Telnet


Correct Answer - Botnet



28  What does HTTP stand for in a website URL?

A. HyperText Transfer Protocol Secure

B. HyperText Transfer Protocol Standard

C. HyperText Transmission Protocol Secure

D. HyperText Transfer Privacy and Security


Correct Answer - HyperText Transfer Protocol Standard



यदि आपको RSCIT Ilearn के अन्य असाइनमेंट के महत्वपूर्ण प्रश्न उत्तर पढ़ने है तो नीचे दिये गए लिंक पर क्लिक करके पढ़ सकते है, इससे आप अच्छे अंक प्राप्त कर सकेंगे ।

RSCIT iLearn के अन्य असाइनमेंट से सम्बंधित प्रश्न पढ़ने के लिए क्लिक करें