ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern): Questions 83 - 88 of 471

Access detailed explanations (illustrated with images and videos) to 471 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 300.00 or

How to register?

Question number: 83

» Computer Application and Data Processing » Network » Firewall

Edit
MCQ▾

Question

In Packet filtering, filtering rules is/are based on:

Choices

Choice (4) Response

a.

Source and destination IP address.

b.

IP protocol field

c.

Source and destination transport-level address.

d.

All a. , b. and c. are correct

Question number: 84

» Computer Application and Data Processing » Basics of Computer » Operating Systems

Edit
MCQ▾

Question

Windows applications can be used on Linux

Choices

Choice (4) Response

a.

Not possible to implement windows application on Linux

b.

By trying CrossOver

c.

By using Wine

d.

Both b. and c. are correct

Question number: 85

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

In a payment gateway system, when a customer receive a payment message what happen next?

Choices

Choice (4) Response

a.

A decrypted message got split and added to database.

b.

An encrypted message is send to Client bank.

c.

An encrypted message is send to merchant bank.

d.

None of the above

Question number: 86

» Computer Application and Data Processing » Network » Spyware & Malware

Edit
MCQ▾

Question

Software that covertly gathers user information without the user’s knowledge are called?

Choices

Choice (4) Response

a.

Browser hijackers

b.

Adware

c.

Trojan horse

d.

Spyware

Question number: 87

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

Which of the following statement is/are correct regarding Message Digest?

Choices

Choice (4) Response

a.

The encrypted data packets can easily be decrypted.

b.

A hash value is calculated by other end user.

c.

Actual data is sent in encrypted form.

d.

Question does not provide sufficient data or is vague

Question number: 88

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

Which of the following statement is/are correct regarding Public Key Encryption?

Choices

Choice (4) Response

a.

The secret key can be found on public domain.

b.

Public key is used by receiver to encrypt the data.

c.

Every user has a Secret Key.

d.

All of the above