Online Test      LOGIN      SIGN UP
Forgot your password?
  • Computer Practice Computer Awareness Study Material

Digitization help student to explore and study their academic courses online, as this gives them flexibility and scheduling their learning at their convenience. Kidsfront has prepared unique course material of Computer Awareness Computer and Data Security for Computer Practice student. This free online Computer Awareness study material for Computer Practice will help students in learning and doing practice on Computer and Data Security topic of Computer Practice Computer Awareness. The study material on Computer and Data Security, help Computer Practice Computer Awareness students to learn every aspect of Computer and Data Security and prepare themselves for exams by doing online test exercise for Computer and Data Security, as their study progresses in class. Kidsfront provide unique pattern of learning Computer Awareness with free online comprehensive study material and loads of Computer Practice Computer Awareness Computer and Data Security exercise prepared by the highly professionals team. Students can understand Computer and Data Security concept easily and consolidate their learning by doing practice test on Computer and Data Security regularly till they excel in Computer Awareness Computer and Data Security.


Computer and Data Security
Which of the following is something that may or may not happen, but has the potential to cause serious damage. It can lead to attacks on computer systems, networks and more.

a) Virus
b) Threat
c) Spam
d) None of these



Answer
Correct Answer Is : Threat
Solution Is :
How many types of attacks in networks.

a) 3_
b) 4_
c) 2_
d) 6_



Answer
Correct Answer Is : 2_
Solution Is :
Which of the following assests are accessible to authorized parties at appropriate times.

a) Availability
b) Confidentiality
c) Integrity
d) None of these



Answer
Correct Answer Is : Availability
Solution Is :
What is the full form of DoS.

a) Disk Operating System
b) Destination of Science
c) Denial Of Service
d) None of these



Answer
Correct Answer Is : Denial Of Service
Solution Is :
Which of the following in DoS attack.

a) They are nastiest.
b) They are very easy to launch.
c) They are difficult to track.
d) All of these



Answer
Correct Answer Is : All of these
Solution Is :
In DMZ, what is the meaning of Z.

a) Zone
b) Zero
c) Zoological
d) None of these



Answer
Correct Answer Is : Zone
Solution Is :
A form of computer hacking in which corrupt Domain Name System data is introduced into a DNS resolver`s cache, causing the name server to return an incorrect IP address is called

a) Smurf Attack
b) DNS Spoofing
c) Buffer Overflow
d) None of these



Answer
Correct Answer Is : DNS Spoofing
Solution Is :
The unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission. It is called as

a) Trojans
b) Worm
c) Malware
d) Eavesdropping



Answer
Correct Answer Is : Eavesdropping
Solution Is :
The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information is called as

a) Information Security
b) Computer Security
c) Trojan
d) None of these



Answer
Correct Answer Is : Information Security
Solution Is :
Data Integrity means

a) The information is not made available or disclosed to unauthorized individuals.
b) Maintaining and assuring the accuracy and completeness of data over its entire life-cycle.
c) The information must be available when it is needed.
d) None of these



Answer
Correct Answer Is : Maintaining and assuring the accuracy and completeness of data over its entire life-cycle.
Solution Is :
PREVIOUS

Preparation for Exams

script type="text/javascript">