Computer Awareness for Upcoming Exams Set 101

Computer Awareness Questions for IBPS PO/Clerk, IBPS RRB, NIACL, NICL, RBI Assistant, UIICL, OICL, BoB and other competitive exams.

  1. Which of the following is an ip address that is private (i.e. reserved for internal networks, and not a valid address to use on the internet)?
    A) 172.12.42.5
    B) 172.140.42.5
    C) 172.31.42.5
    D) 172.15.45.5
    View Answer
    Option C
    Some extra:
    The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the
    IP address space for private Internets – 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255,
    and 192.168.0.0 to 192.168.255.255- that are known as “global non-routable addresses.”
  2. How long are IPv4 addresses?
    A) 32 bits long
    B) 64 bits long
    C) 128 bits long
    D) 16 bits long
    View Answer
    Option A
  3. How long are IPv6 addresses?
    A) 32 bits long
    B) 64 bits long
    C) 128 bits long
    D) 16 bits long
    View Answer
    Option C
  4. Which of the following ensures that security is not breached when a system crash or other system failure occurs?
    A) trusted recovery
    B) hot swappable
    C) redundancy
    D) secure boot
    View Answer
    Option A
    Some Extra:

    Trusted Recovery – When an operating system or application crashes or freezes, it should not put the sytem in any time of secure state.
  5. What process determines who is trusted for a given purpose?
    A) Identification
    B) Authorization
    C) Authentication
    D) Accounting
    View Answer
    Option B
    Some Extra:

    Authorization determines who is trusted for a given purpose. More precisely, it
    determines whether a particular principal, who has been authenticated as the source of
    a request to do something, is trusted for that operation. Authorization may also
    include controls on the time at which something can be done (e.g. only during working
    hours) or the computer terminal from which it can be requested (e.g. only the one on
    the system administrator desk).
  6. Which one of the following risk analysis terms characterizes the absence or weakness of a
    risk-reducing safegaurd?
    A) Threat
    B) Probability
    C) Vulnerability
    D) Loss expectancy
    View Answer
    Option C
  7. Security procedures:
    A) will eliminate all computer security risk.
    B) can reduce but not eliminate risks.
    C) are prohibitively expensive.
    D) are inaccessible for the average home user.
    View Answer
    Option B
  8. All of these are suggestions for safe computing EXCEPT:
    A) don’t borrow disks from other people.
    B) open all e-mail messages but open them slowly.
    C) download shareware and freeware with caution.
    D) disinfect your system
    View Answer
    Option B
  9. Most computer systems rely solely on ___________ for authentication.
    A) logins
    B) passwords
    C) encryption
    D) lock and key
    View Answer
    Option B
  10. To prevent the loss of data during power failures, use a(n):
    A) encryption program
    B) surge protector
    C) firewall
    D) UPS
    View Answer
    Option D

Click here for More Computer Awareness Questions

 

Related posts

8 Thoughts to “Computer Awareness for Upcoming Exams Set 101”

  1. Ittu Si Barbie (。♥‿♥。)

    Thanku AZ ??

  2. jocund21

    8.75/10 Thanks AZ:)

  3. Sachin shukla( Banker 2018)

    ty:)

  4. Jeetesh Chandra

    9/10..ty AZ

  5. MAYANK BHARADWAJ100%

    Thks

Leave a Comment