माइक्रोसॉफ्ट वर्ड
RSCIT iLearn Assessment - माइक्रोसॉफ्ट वर्ड with answers.
RSCIT iLearn Assessment - 11 - माइक्रोसॉफ्ट वर्ड - के महत्वपूर्ण प्रश्न-उत्तर पढ़ने वाले है, वो भी उत्तर कुंजी (Answer Key) के साथ। माइक्रोसॉफ्ट वर्ड के महत्वपूर्ण प्रश्न-उत्तर देखने के लिए नीचे स्क्रॉल करे.
1  A malicious code hidden inside a seemingly harmless piece of code.
A. Worm
B. Bomb
C. Trojan Horse
D. Virus
2  What is the use of firewall?
A. Filters the packets that come from internet
B. Filters the packets that come from internet to intranet
C. Filters the packet transmitted to internet
D. Ensure the packets faster traffic for fast e-commerce
3  What is the keylogger in the context of password attacks?
A. Software that generates random passwords
B. Malicious software that records keystrokes on a compromised device
C. A tool for cracking password hashes
D. A type of phishing attack
4  What is ransomware designed to?
A. Steal personal infotmation
B. Disabble antivirus software
C. Encrypt files and demand payment for their release
D. Track user activities on the internet
5  Which of the following will not protect you from spam?
A. Filters
B. Popup blocker
C. E-mail rules
D. Spam blocker
6  What is brute force attack in the context of password security?
A. Exploiting software vulnerabilities
B. Guessing passwords through trial and error
C. Intercepting communication between device
D. Using social engineering to obtain passwords
7  Viruses which execute when computer starts is-
A. Macro
B. File infector
C. Boot sector
D. None of the above
8  Who monitors the activity of user on internet and transmit to someone else?
A. Adware
B. Spyware
C. Malware
D. None of the above
9  When hckers flood a web site with useless traffic to overwhelm the network, it is called………….
A. a Denial of Service (DOS) attack
B. spoofing
C. pishing
D. None of the above
10  What is the primary goal of a credential phishing attack?
A. Installing maleware on a device
B. Intercepting passwords during transmission
C. Gaining unauthorized access to a network
D. Obtaining sensitive information, such as usernames and passwords
11  A website URL that starts with http:// and includes a padlock icon in the address bar indicates:
A. The website is using an outdated security protocol
B. The website is using a secure connection with encryption
C. The website is immune to all types of cyber threats
D. 
12  What is phishing in the context of cybersecurity?
A. A type of malware
B. Unauthorized access to a system
C. An attempt to trick individuals into revealing sensitive information
D. 
13  What is a person called when they try to hurt a group of people with the use of a computer?
A. Cracker
B. Social engineer
C. Cyber terroist
D. White hat intruder
14  Which Computer virus records every movement you make on your computer?
A. Dos
B. Malware Android
C. Trapper
D. Keylogger
15  Study of creating and using encryption and decryption techniques?
A. Cipher
B. Cryptography
C. Encryption
D. Decryption
16  Which of the following is independent malicious program that need not any host program?
A. Virus
B. Logic Bomb
C. Worm
D. Trap doors
17  What is purpose of regularly clearing browser cache and cookies for secure browsing?
A. Enhancing website performance
B. Deleting saved documents
C. Preventig website from tracking activities
D. Disabling browser extensions
18  Malicious program that does not replicate autometically is-
A. Trojan horse
B. Worm
C. Zombie
D. Virus
19  ………..are computer program that are designed by attackers to gain root or administrative access to your computer.
A. Backdoors
B. Rootkits
C. Malware
D. Antiware
20  What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
A. Cracker
B. Worm
C. Trojan Horse
D. Keylogger
21  Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A. Viruses
B. Trojan horses
C. Bots
D. Worms
22  What does the presence of www in website URL signify?
A. The website is more trustworthy
B. The website is using outdated technology
C. The website is less secure
D. It is just a naming convention and does not affect security
23  Which of the following is a common security feature found in reputable online payment portals?
A. Requesting payment in cryptocurrency only
B. Using HTTP instead of HTTPS
C. Two- factor authentication
D. Display pop-up ads during the payment process
24  Which of the following is a class of computer threat?
A. Phishing
B. Soliciting
C. Stalking
D. DOS attacks
25  Which type of attack involves sending deceptive e-mails to trick individuals into revealing sensitive information, including passwords?
A. Brute force attack
B. Phishing attack
C. Dictionary attack
D. Rainbow table attack
26  Unsolicited commercial e-mail are also called-
A. Spyware
B. Malware
C. Spam
D. Virus
27  The attackers a network of compromised devices known as-
A. D-net
B. Internet
C. Botnet
D. Telnet
28  What does HTTP stand for in a website URL?
A. HyperText Transfer Protocol Secure
B. HyperText Transfer Protocol Standard
C. HyperText Transmission Protocol Secure
D. HyperText Transfer Privacy and Security