Computer Awareness for Upcoming Exams Set 100

Computer Awareness Questions forĀ IBPS PO/Clerk, IBPS RRB, NIACL, NICL, RBI Grade B, BOI, OBC SO, BoB and other competitive exams.

  1. Which of the following groups represents the leading source of computer crime losses?
    A) Hackers
    B) Industrial saboteurs
    C) Foreign intelligence officers
    D) Employees
    View Answer
    Ā Ā Option D
    Ā 
  2. Which of the following is biggest factor that makes Computer Crimes possible?
    A) The fraudster obtaining advanced training & special knowledge.
    B) Victim carelessness.
    C) Collusion with others in information processing.
    D) System design flaws.
    View Answer
    Ā Ā Option B
  3. Which of the following computer crime is MORE often associated with INSIDERS?
    A) IP spoofing
    B) Password sniffing
    C) Data diddling
    D) Denial of service (DOS)
    View Answer
    Ā Ā Option C
    Some Extra:

    Data diddling is the changing of data before or during entry into the computer system. Examples include forging or counterfeiting documents used for data entry and exchanging valid disks and tapes with modified replacements.
  4. Which of the following is not a form of passive attack?
    A) Scavenging
    B) Data diddling
    C) Shoulder surfing
    D) Sniffing
    View Answer
    Ā Ā Option B
    Some Extra:

    A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target.
  5. Crackers today are MOST often motivated by their desire to:
    A) Help the community in securing their networks.
    B) Seeing how far their skills will take them.
    C) Getting recognition for their actions.
    D) Gaining Money or Financial Gains.
    View Answer
    Ā Ā Option D
    Some Extra:

    A cracker is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there
  6. Which of the following logical access exposures INVOLVES CHANGING data before, or as it is entered into the computer?
    A) Data diddling
    B) Salami techniques
    C) Trojan horses
    D) Viruses
    View Answer
    Ā Ā Option A
    Ā 
  7. Which of the following tools is NOT likely to be used by a hacker?
    A) Nessus
    B) Saint
    C) Tripwire
    D) Nmap
    View Answer
    Ā Ā Option C
    Some Extra:

    Open Source Tripwire is a free software security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.
  8. Which of the following is an example of an active attack?
    A) Traffic analysis
    B) Scanning
    C) Eavesdropping
    D) Wiretapping
    View Answer
    Ā Ā Option B
    Some Extra:

    An “active attack” attempts to alter system resources or affect their operation.
    An attack can be perpetrated by an insider or from outside the organization.
  9. Which of the following categories of hackers poses the greatest threat?
    A) Disgruntled employees
    B) Student hackers
    C) Criminal hackers
    D) Corporate spies
    View Answer
    Ā Ā Option A
    Some Extra:

    A disgruntled employee is a potential threat and risk to business that should be taken seriously, especially during massive business changes
  10. An attack that involves an fraudster tricking a user into making inappropriate security decisions is known as:
    A) Spoofing
    B) Surveillance
    C) Social Engineering
    D) Man-in-the-Middle
    View Answer
    Ā Ā Option C
    Some Extra:

    Social engineering is the art of manipulating people so they give up confidential information.

 

Click here for More Computer Awareness Questions

 

 

Related posts

24 Thoughts to “Computer Awareness for Upcoming Exams Set 100”

  1. Priyanka Khandelwal

    Ty…

  2. Sachin shukla( Banker 2018)

    ty

  3. Jeetesh Chandra

    ty,,,,,,,

  4. Jesse Pinkman

    Ty..

  5. %%%

    I think 1) answer should be “Hacker”

    1. No

      Leading is employees of organization

  6. ~~Sb acha hoga Ab ~~āˆš

    ty šŸ™‚

  7. 678854 195859very nice post, i definitely enjoy this fabulous website, persist with it 731321

  8. Pretty section of content. I just stumbled upon your website
    and in accession capital to assert that I get in fact
    enjoyed account your blog posts. Any way I’ll be subscribing to your feeds and
    even I achievement you access consistently fast.

  9. If you desire to obtain much from this piece of writing then you have to apply these methods to your won weblog.

  10. Quality articles or reviews is the crucial to invite the viewers to pay a quick visit the site, that’s what this website is providing.

  11. Heya i am for the first time here. I found this board and I find It truly
    useful & it helped me out much. I hope to give one thing back and aid others such as you helped me.

  12. 217067 804726I located your weblog internet site on google and check a couple of of your early posts. Proceed to sustain up the really very good operate. I just extra up your RSS feed to my MSN News Reader. Looking for ahead to reading extra from you later on! 193609

  13. Woah! I’m really enjoying the template/theme of this blog.

    It’s simple, yet effective. A lot of times it’s challenging
    to get that “perfect balance” between usability and visual appearance.

    I must say that you’ve done a awesome job with this.

    In addition, the blog loads very fast for me on Firefox. Excellent Blog!

  14. Write more, thats all I have to say. Literally, it seems as though you relied on the video to make
    your point. You obviously know what youre talking about, why throw
    away your intelligence on just posting videos to your weblog when you
    could be giving us something enlightening to read?

  15. Hi there! This is my 1st comment here so I just wanted to give
    a quick shout out and tell you I genuinely enjoy reading your blog posts.
    Can you suggest any other blogs/websites/forums that cover the same subjects?

    Thank you so much!

  16. Excellent beat ! I wish to apprentice while you
    amend your website, how can i subscribe for a blog website?
    The account helped me a acceptable deal. I had been tiny bit
    acquainted of this your broadcast provided bright clear concept

  17. This blog was… how do you say it? Relevant!! Finally I have found something that helped me. Thanks!

  18. I think the admin of this web site is genuinely working hard in favor of his site, as here every data is quality based stuff.

  19. This is the right site for anyone who wants to find out about this topic.
    You know a whole lot its almost hard to argue with you
    (not that I actually will need toā€¦HaHa). You certainly put a new spin on a subject which has been discussed for
    decades. Great stuff, just great!

  20. Aw, this was an incredibly nice post. Spending some time and actual effort to produce a great articleā€¦ but what can I sayā€¦ I put things off a whole lot and never seem to get anything done.

Comments are closed.