New Student User - HELLO

Join Here

Computer Awareness - Expected Questions for IBPS PO Mains

Published on Saturday, October 17, 2015
computer questions
Q1. Trojan Horse is:
a) A programs that overtly does one thing while covertly doing another
b) Can be used to spread infection from one computer to another 
c) A program that has a secret entry point
d) Others


Q2. Storage media:
a) a collection of software, hardware 
b) the intruder may steal computer time just to do computing and he can destroy software
c) effective security plans consider adequate backups of data and physical protection for the media contains these backups
d) others 

Q3. OS controls:
a) Limitations enforced by the OS to protect each user from other users
b) Quality standards under which program is designed, coded, tested and maintained
c) Parts of the program that enforce security restriction such as access limitation in a data base management system
d) Others

Q4. Cipher text is:
a) the encrypted form
b) a system of encryption and decryption 
c) hidden writing
d) others 

Q5. Transient:
a) runs when its attached program executes and terminates when its attached program ends
b) locates itself in memory so that it can remain active even after its attached program ends
c) a class of malicious code that detonates when a specified condition occurs
d) other


Q6. Packet - filtering Router means:
a) applies a set of rules to each incoming IP packet and then forwards or discards the packet.
b) also called proxy server
c) acts as a relay of application level traffic
d) others 


Q7. Appended Viruses:
a) Virus code runs the original program but has control before and after its execution
b) Virus code attaches itself to a program and is activated whenever the program is run
c) Virus program replaces some of its target, integrating itself into the original code of the target
d) Others

Q8. Homs for Viruses:
a) Boot Sector Viruses
b) Memory Resident Viruses
c) Other Homes (like application)
d) All


Q9. Virus signatures are used by virus scanners to detect the virus in:
a) Storage Patterns
b) Boot Sector
c) Object Code
d) Others


Q10. Polymorphic Viruses using encryption contains three parts one of them:
a) encryption key
b) encrypted code
c) unencrypted object code of the decryption routine
d) others


Q11. Preventing Virus Infection:
a)  Use only commercial software acquired from reliable, well established vendors
b) test all old software on an isolated computer
c) make many copies for your software
d) others


Q12. The Sources of Trapdoors are:
a)  Debug commands left is code before testing
b) Poor error checking
c)  A small amount of money is shaved from each computation
d) Others


Q13. The causes of Trapdoors are:
a) forgets to remove them
b) intentionally leaves them for programmers
c) intentionally leaves them for users
d) others


Q14. The basic principles of software engineering is:
a) Division of Labor
b) Reuse of Code
c) Use of Standard Pre - constructed Software tools
d) All 

Q15. Characteristics of a Module are:
a) Unity
b) Reuse of Code
c) Organized Activity
d) Others


Q16. Program correctness proofs are hindered by:
a) program translation is error prone
b) the logical engines are slow
c) proofs of correctness have not been consistently and successfully applied to large production systems
d) All 


Q17. Characteristics of Trusted Software are:
a) Functional Correctness
b) Enforcement of Integrity
c) Limited Privilege 
d) All 


Q18. By Patents we mean:
a) protect inventions 
b) algorithms are facts of nature
c) patent process is expensive 
d) Others 

Q19. In the fire wall service control:
a) determines the types of internet services that can be accessed, inbound or outbound
b) determines the direction in which particular service requests are allowed to flow
c) controls access to a service according to which user is attempting to access it
d) Others 

Q20. Threats are categorized as:
a) Passive or Active
b) Traffic
c) Masquerade 
d) Others 

Q21. Release of message contents means:
a) obtain information that is being transmitted 
b) telephone conversation, email message and transferred files
c) attack that have a specific target
d) Others 

Q22. The basic elements of model of access control are:
a)  subject, object, access right
b) capability list, object, access right
c) centralized, decentralized
d) others


Q23. In the boot sector viruses, virus:
a) gains control very early in the boot process before most detection tools are active
b) gains control very early in the boot process after most detection tools are active
c) gains control in AUTOEXEC.BAT batch file
d) others


Q24. By Salami Attack Virus we mean:
a) control viruses
b) a small amount of money is shaved from each computation 
c) trapdoors persist 
d) Others

Q25. The main idea of peer review is:
a) each team member has a clear design document
b) team members review each others' code
c) all team members recognize that the product belongs to the group 
d) all of the above


==>> Computer Awareness PDF


ebook store

About Me

Ramandeep Singh

Ramandeep Singh - Educator

I'm Ramandeep Singh, your guide to banking and insurance exams. With 14 years of experience and over 5000 successful selections, I understand the path to success firsthand, having transitioned from Dena Bank and SBI. I'm passionate about helping you achieve your banking and insurance dreams.

  • Follow me:
Close Menu
Close Menu