Computer Awareness Quiz - Set 95

image 2018-01-10 13:45:04
Computer Awareness Quiz - Set 95

Q1. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
(a) TCP
(b) UDP
(c) DCCP
(d) SCTP
(e) All of the above

Q2. Which one of the following protocol is used to receive mail messages?
(a) SMTP
(b) post office protocol
(c) internet message access protocol
(d) ARP
(e) all of the mentioned

Q3. A ______is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of cybercrime.
(a) internet
(b) Botnet
(c) Dotnet
(d) D-Net
(e) None of the above

Q4. Which of the following is a form of DoS attack ?
(a) Vulnerability attack
(b) Bandwidth flooding
(c) Connection flooding
(d) All of the mentioned
(e) None of the above

Q5. Firewalls are often configured to block
(a) UDP traffic
(b) TCP traffic
(c) Both (a) and (b)
(d) None of the mentioned
(e) Email access

Q6. Sniffers can be deployed in
(a) Wired environment
(b) Wireless Fidelity
(c) Ethernet LAN
(d) All of the mentioned
(e) None of the above

Q7. WPA2 is used for security in
(a) ethernet
(b) bluetooth9
(c) wireless fidelity(wi-fi)
(d) none of the mentioned
(e) can be used in all of the above

Q8. Voice privacy in GSM cellular telephone protocol is provided by
(a) A5/2 cipher
(b) b5/4 cipher
(c) b5/6 cipher
(d) b5/8 cipher
(e) None of the above

Q9. An attempt to make a computer resource unavailable to its intended users is called
(a) denial-of-service attack
(b) virus attack
(c) worms attack
(d) botnet process
(e) spam attack

Q10. Common gateway interface is used to
(a) generate executable files from web content by web server
(b) generate web pages
(c) stream videos
(d) none of the mentioned
(e) All of the above


Q1. a, Q2. a, Q3. b, Q4. d, Q5. a
Q6. d, Q7. c, Q8. a, Q9. a, Q10. a