Computer Application and Data Processing-Network (ISS Statistics Paper I (New 2016 MCQ Pattern)): Questions 48 - 53 of 58

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 404 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 48

» Computer Application and Data Processing » Network » Virus

MCQ▾

Question

Which of the following task can be performed by a Malicious payload?

Choices

Choice (4) Response

a.

Plant backdoors in the system.

b.

Delete files

c.

Reveal confidential data.

d.

All a. , b. and c. are correct

Question number: 49

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following device can be used in Backup Media?

Choices

Choice (4) Response

a.

Thumb Drive

b.

Tape Drive

c.

Zip Drive

d.

All a. , b. and c. are correct

Question number: 50

» Computer Application and Data Processing » Network » Firewall

MCQ▾

Question

In Packet filtering, filtering rules is/are based on:

Choices

Choice (4) Response

a.

Source and destination transport-level address.

b.

Source and destination IP address.

c.

IP protocol field

d.

All a. , b. and c. are correct

Question number: 51

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

In a payment gateway system, when a customer receive a payment message what happen next?

Choices

Choice (4) Response

a.

An encrypted message is send to merchant bank.

b.

An encrypted message is send to Client bank.

c.

A decrypted message got split and added to database.

d.

All of the above

Question number: 52

» Computer Application and Data Processing » Network » Spyware & Malware

MCQ▾

Question

Software that covertly gathers user information without the user’s knowledge are called?

Choices

Choice (4) Response

a.

Trojan horse

b.

Spyware

c.

Adware

d.

Browser hijackers

Question number: 53

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding Message Digest?

Choices

Choice (4) Response

a.

A hash value is calculated by other end user.

b.

Actual data is sent in encrypted form.

c.

The encrypted data packets can easily be decrypted.

d.

All of the above

Sign In