ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern): Questions 67 - 71 of 472

Access detailed explanations (illustrated with images and videos) to 472 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time! View Sample Explanation or View Features.

Rs. 300.00 or

How to register?

Question number: 67

» Computer Application and Data Processing » Network » Internet

Edit
MCQ▾

Question

Which of the following property is satisfied by Peer to peer network?

Choices

Choice (4)Response

a.

It has dedicated servers.

b.

It is a cheap solution for sharing information or devices.

c.

It has centralized administration.

d.

It can have a spread over thousands of kilometer.

Question number: 68

» Computer Application and Data Processing » Network » Antivirus

Edit
MCQ▾

Question

Which of the following is a type of kinds of vulnerabilities seen in antivirus software?

Choices

Choice (4)Response

a.

Engine-based

b.

ActiveX-related

c.

Local Privilege Escalation

d.

All a. , b. and c. are correct

Question number: 69

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

Confidentiality in Computer Security refers to:

Choices

Choice (4)Response

a.

The situation that an unauthorized party has gained access to a service or data.

b.

Improper alterations in a secure computer system should be detectable and recoverable.

c.

Information of computer is disclosed only to authorize parties.

d.

Both b. and c. are correct

Question number: 70

» Computer Application and Data Processing » Network » Internet

Edit
MCQ▾

Question

An Internet-type application uses following Internet protocol:

Choices

Choice (4)Response

a.

SMTP

b.

HTTP

c.

FTP

d.

All a. , b. and c. are correct

Question number: 71

» Computer Application and Data Processing » Network » Antivirus

Edit
MCQ▾

Question

Antivirus software will always detect:

Choices

Choice (4)Response

a.

Viruses that have been identified by the author of the anti-virus software

b.

Encrypted viruses

c.

Macro viruses

d.

None of the above

Developed by: