Computer Application and Data Processing-Network (ISS Statistics Paper I (New 2016 MCQ Pattern)): Questions 48 - 53 of 58

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 469 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 48

» Computer Application and Data Processing » Network » Virus

MCQ▾

Question

Which of the following task can be performed by a Malicious payload?

Choices

Choice (4) Response

a.

Plant backdoors in the system.

b.

Delete files

c.

Reveal confidential data.

d.

All a. , b. and c. are correct

Question number: 49

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following device can be used in Backup Media?

Choices

Choice (4) Response

a.

Thumb Drive

b.

Tape Drive

c.

Zip Drive

d.

All a. , b. and c. are correct

Question number: 50

» Computer Application and Data Processing » Network » Firewall

MCQ▾

Question

In Packet filtering, filtering rules is/are based on:

Choices

Choice (4) Response

a.

Source and destination transport-level address.

b.

Source and destination IP address.

c.

IP protocol field

d.

All a. , b. and c. are correct

Question number: 51

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

In a payment gateway system, when a customer receive a payment message what happen next?

Choices

Choice (4) Response

a.

An encrypted message is send to merchant bank.

b.

An encrypted message is send to Client bank.

c.

A decrypted message got split and added to database.

d.

All of the above

Question number: 52

» Computer Application and Data Processing » Network » Spyware & Malware

MCQ▾

Question

Software that covertly gathers user information without the user’s knowledge are called?

Choices

Choice (4) Response

a.

Trojan horse

b.

Spyware

c.

Adware

d.

Browser hijackers

Question number: 53

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding Message Digest?

Choices

Choice (4) Response

a.

A hash value is calculated by other end user.

b.

Actual data is sent in encrypted form.

c.

The encrypted data packets can easily be decrypted.

d.

All of the above

f Page
Sign In