Saturday, 30 January 2016

IT officer Multiple Choice Question and answers Quiz 147

Here is the top expected  IT officer Multiple Choice Question and answers for your upcoming Exam.

1. Firewalls are used to protect against.
A) Unauthorized Attacks
B) External resources
C) Data Driven Attacks
D) Fire Attacks

2. A gigabyte represents
A) 1 billion bytes
B) 1000 kilobytes
C) 230 bytes
D) 1024 bytes

3. Personal computers use number of chips mounted on a main circuit board. What is the common name for such boards?
A) Daughter board
B) Mother board
C) Father board
D) Bread board

4.  In analog computer
A) Input is first converted to digital form
B) Input is never converted to digital form
C) Output is displayed in digital form
D) All of the above

5. Computer follows a simple principle called GIGO which means.
A) Garbage input good output
B) Garbage in garbage out
C) Great instructions great output
D) Good input good output

6. A data Structure where elements can be added or removed at either end but not in the middle.
A) Linked list
B) Stacks
C) Queues
D) Deque

7. Which of the following sorting algorithm is of divide and conquer type?
A) Bubble sort
B) Insertion sort
C) Quick sort
D) None of the above

8. A variable P is called pointer if
A) P contains the address of an element in DATA
B) P points to the address of first element in DATA
C) P can store only memory addresses
D) P contain the DATA and the address of DATA

9. Binary search algorithm cannot be applied to
A) Sorted linked list
B) Sorted binary trees
C) Sorted linear array
D) Pointer array

10. The time factor when determining the efficiency of algorithm is measured by
A) Counting microsecond's
B) Counting the number of key operations
C) Counting the number of statements                
D) Counting the kilobytes of algorithm

  
Answers:
1.       A) Unauthorized Attacks
2.       A) 1 billion bytes
3.       B) Mother board
4.       B) Input .... digital form
5.       B) Garbage in gar.. out
6.       D) Deque
7.       C) Quick sort
8.       A) P contains.addr .. DATA
9.       D) Pointer array
10.   A) Counting microsecond's


1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity

2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
A) Confidentiality
B) Integrity
C) Availability
D) Authenticity


3. The type of threats on the security of a computer system or network are ……………………..
i) Interruption                   ii) Interception                  iii) Modification
iv) Creation                         v) Fabrication
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, ii, iii and v only
D) All i, ii, iii, iv and v

4. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm

5. The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus

6. The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus

7. Which of the following malicious program do not replicate automatically?
A) Trojan Horse
B) Virus
C) Worm
D) Zombie

8. …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb

9. State whether true of false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
A) True, False
B) False, True
C) True, True
D) False, False

10. A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answers:
1.       B) Integrity
2.       A) Confidentiality
3.       C) i, ii, iii and v only
4.       D) Worm
5.       A) Trap doors
6.       C) Logic Bomb
7.       A) Trojan Horse
8.       C) Trojan Horses
9.       C) True, True
10.   B) Virus


1. …………….. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse

2. Select the correct order for the different phases of virus execution.
i) Propagation phase                      ii) Dormant phase
iii) Execution phase                         iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i


3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

4. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

5. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

6. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine       
C) multiple engine
D) polymorphic engine

7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii

8. The type(s) of auto executing macros, in Microsoft word is/are
A) Auto execute
B) Auto macro
C) Command macro
D) All of the above

9. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.
A) Dormant phase
B) Propagation phase
C) Triggering phase
D) Execution phase

10. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
Answers:
1.       B) Zombie
2.       C) ii, i, iv an iii
3.       C) Parasitic Virus
4.       A) Stealth virus
5.       B) Polymorphic Virus
6.       B) mutation engine
7.       C) Both i and ii
8.       D) All of the above
9.       B) Propagation phase
10.   B) Zombie



No comments:

Post a Comment

Advertisement