Computer Quiz – 104

Computer Quiz

1. A vulnerability scanner is?
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Click here to View Answer
Answer b) a tool used to quickly check computers on a network for known weaknesses.

2. A program either talk or music, that is made available in digital format for automatic download over the internet is called a?
a) Wiki
b) Broadcast
c) Vodcast
d) Blog
e) None of these

Click here to View Answer
Answer d) Blog

3. Which power point view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
a) Slide sorter
b) Slide show
c) Slide master
d) Notes page
e) None of these

Click here to View Answer
Answer a) Slide sorter

4. Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
a) Conductors
b) Buses
c) Connectors
d) Consecutives
e) None of these

Click here to View Answer
Answer b) Buses

5. This hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed?
a) White hat
b) Grey hat
c) Blue hat
d) None of these

Click here to View Answer
Answer c) Blue hat

6. It is a software program designed to record (‘log’) every keystroke on the machine on which it runs?
a) Keylogger
b) Worm
c) Virus
d) Cracker

Click here to View Answer
Answer a) Keylogger

7. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.
a) Keylogger
b) Worm
c) Virus
d) Cracker

Click here to View Answer
Answer c) Virus

8. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies ofitself on one system: it propagates through computer networks?
a) Keylogger
b) Worm
c) Cracker
d) None of these

Click here to View Answer
Answer b) Worm

9._________a document means the file is transferred from another computer to your computer.
a) Uploading
b) Really Simple Syndication
c) Accessing
d) Downloading
e) None of these

Click here to View Answer
Answer b) Really Simple Syndication

10. Which computer memory is used for storing programs and data currently being processed by the CPU?
a) Mass memory
b) Internal memory
c) Non-volatile memory
d) PROM
e) None of these

Click here to View Answer
Answer b) Internal memory