Cyber Security-IV (Module 4: System And Application Security)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Praveen26dec1985
P
Praveen26dec1985
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,093
Questions: 25 | Attempts: 106

SettingsSettingsSettings
Cyber Security-IV (Module 4: System And Application Security) - Quiz


MBA-II
Sem-IV
Total Marks-25


Questions and Answers
  • 1. 

    Identify false statement

    • A.

      You can find deleted files in recycle bin

    • B.

      You can restore any files in recycle bin if you ever need

    • C.

      You can increase free space of disk by sending files in recycle bin

    • D.

      You can right click and choose Empty Recycle Bin to clean it at once

    Correct Answer
    C. You can increase free space of disk by sending files in recycle bin
  • 2. 

    If the displayed system time and date is wrong, you can reset it using

    • A.

      Write

    • B.

      Calendar

    • C.

      Write file

    • D.

      Control panel

    Correct Answer
    D. Control panel
    Explanation
    The control panel is the correct answer because it is a feature in most operating systems that allows users to manage and customize various system settings, including the date and time. By accessing the control panel, users can easily reset the system time and date if it is displayed incorrectly.

    Rate this question:

  • 3. 

    You should save your computer from?

    • A.

      Viruses

    • B.

      Time bombs

    • C.

      Worms

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    It is important to save your computer from viruses, time bombs, and worms as they can cause significant damage to your system. Viruses are malicious software programs that can replicate themselves and infect other files, while time bombs are designed to activate at a specific time or date, causing harm to your computer. Worms are self-replicating malware that can spread across networks and cause damage. Therefore, saving your computer from all of these threats is essential to protect your data and ensure the proper functioning of your system.

    Rate this question:

  • 4. 

    A Microsoft Windows is ….. a(n)

    • A.

      Operating system

    • B.

      Graphic program

    • C.

      Word Processing

    • D.

      Database program

    Correct Answer
    A. Operating system
    Explanation
    The correct answer is "Operating system" because Microsoft Windows is a widely used operating system that provides a platform for running computer programs and managing hardware devices. It provides a user-friendly interface, file management system, and various utilities to perform tasks such as running applications, accessing the internet, managing files, and controlling hardware devices.

    Rate this question:

  • 5. 

    Which is not application software?

    • A.

      Windows NT

    • B.

      Page Maker

    • C.

      WinWord XP

    • D.

      Photoshop

    Correct Answer
    A. Windows NT
    Explanation
    Windows NT is not considered application software because it is an operating system. Application software refers to programs that are designed to perform specific tasks or applications, such as Page Maker, WinWord XP, and Photoshop. Windows NT, on the other hand, is an operating system that provides the platform for running application software and managing computer resources.

    Rate this question:

  • 6. 

    The …................ program compresses large files into a smaller file

    • A.

      WinShrink

    • B.

      WinZip

    • C.

      WinStyle

    • D.

      None of above

    Correct Answer
    B. WinZip
    Explanation
    WinZip is a program that is commonly used to compress large files into smaller files. It is a popular file compression utility that allows users to reduce the size of files, making them easier to store, send, and share. By compressing files with WinZip, users can save disk space and transfer files more quickly over the internet.

    Rate this question:

  • 7. 

    Which of the following operating system does not implement the multitasking truly?

    • A.

      Windows 98

    • B.

      Windows NT

    • C.

      Windows XP

    • D.

      MS DOS

    Correct Answer
    D. MS DOS
    Explanation
    MS DOS does not implement true multitasking. Unlike the other operating systems listed, MS DOS is a single-tasking operating system, meaning it can only execute one task at a time. It does not have the capability to run multiple programs simultaneously or efficiently share system resources among different tasks.

    Rate this question:

  • 8. 

    Disk scheduling includes deciding

    • A.

      Which should be accessed next

    • B.

      Order in which disk access requests must be serviced

    • C.

      The physical location of the file

    • D.

      The logical location of the file

    Correct Answer
    B. Order in which disk access requests must be serviced
    Explanation
    Disk scheduling involves determining the order in which disk access requests should be serviced. This means deciding the sequence in which the pending disk requests should be executed in order to optimize the disk's performance and minimize the access time. By efficiently organizing the order of disk accesses, disk scheduling algorithms aim to reduce the average seek time and enhance overall system efficiency. Therefore, the correct answer is "order in which disk access requests must be serviced."

    Rate this question:

  • 9. 

    Memory protection is normally done by

    • A.

      The processor and the associated hardware

    • B.

      The operating system

    • C.

      The compiler

    • D.

      The user program

    Correct Answer
    A. The processor and the associated hardware
    Explanation
    Memory protection is a crucial aspect of computer systems to prevent unauthorized access or modification of memory. The responsibility of memory protection lies with the processor and the associated hardware. The hardware implements mechanisms like memory management units (MMUs) and access control lists (ACLs) to ensure that each process can only access its allocated memory and cannot interfere with other processes' memory. The processor enforces these protections by checking memory access requests against the defined permissions. The operating system, compiler, and user program may play a role in configuring these protections, but the actual implementation and enforcement are done by the processor and associated hardware.

    Rate this question:

  • 10. 

    What is the access point (AP) in wireless LAN?

    • A.

      Device that allows wireless devices to connect to a wired network

    • B.

      Wireless devices itself

    • C.

      Both (a) and (b)

    • D.

      None of the mentioned

    Correct Answer
    A. Device that allows wireless devices to connect to a wired network
    Explanation
    The access point (AP) in a wireless LAN is a device that allows wireless devices to connect to a wired network. It acts as a bridge between the wireless devices and the wired network, enabling communication between them. The AP receives data from the wireless devices and forwards it to the wired network, and vice versa. This allows wireless devices to access resources and services on the wired network, such as the internet or shared files.

    Rate this question:

  • 11. 

    In wireless ad-hoc network

    • A.

      Access point is not required

    • B.

      Access point is must

    • C.

      Nodes are not required

    • D.

      None of the mentioned

    Correct Answer
    A. Access point is not required
    Explanation
    In a wireless ad-hoc network, an access point is not required because this type of network is decentralized and does not rely on a central access point for communication. Instead, all nodes in the network can directly communicate with each other, forming a self-configuring network without the need for an access point. This allows for more flexibility and scalability in the network, as nodes can easily join or leave the network without disrupting the overall connectivity.

    Rate this question:

  • 12. 

    In wireless distribution system

    • A.

      Multiple access point are inter-connected with each other

    • B.

      There is no access point

    • C.

      Only one access point exists

    • D.

      None of the mentioned

    Correct Answer
    A. Multiple access point are inter-connected with each other
    Explanation
    The correct answer is that in a wireless distribution system, multiple access points are interconnected with each other. This means that there are multiple access points spread out in a network, and they are connected to each other to provide seamless wireless coverage and connectivity. This allows for better coverage and capacity in a larger area, as well as improved network performance and reliability.

    Rate this question:

  • 13. 

    What is WPA?

    • A.

      Wired protected access

    • B.

      Wi-fi protected access

    • C.

      wired process access

    • D.

      Wi-fi process access

    Correct Answer
    B. Wi-fi protected access
    Explanation
    WPA stands for Wi-Fi Protected Access. It is a security protocol designed to secure wireless computer networks. WPA provides stronger encryption and authentication methods compared to its predecessor, WEP (Wired Equivalent Privacy), making it more secure against unauthorized access and data breaches. By using WPA, users can ensure the confidentiality and integrity of their wireless communications, protecting their sensitive information from potential attackers.

    Rate this question:

  • 14. 

    MCQ MIME stands for

    • A.

      Multipurpose Internet Mail Email

    • B.

      Multipurpose Internet Mail Extensions

    • C.

      Multipurpose Internet Mail End

    • D.

      Multipurpose Internet Mail Extra

    Correct Answer
    B. Multipurpose Internet Mail Extensions
    Explanation
    MIME stands for Multipurpose Internet Mail Extensions. It is a standard that allows email messages to include various types of multimedia content, such as images, audio, and video. This extension is used to define the format of email messages and attachments, ensuring that different email clients can properly interpret and display the content.

    Rate this question:

  • 15. 

    TCP/IP is a:

    • A.

      Network Hardware

    • B.

      Network Software

    • C.

      Protocol

    • D.

      None of these None of these None of these None of these

    Correct Answer
    C. Protocol
    Explanation
    The correct answer is "Protocol" because TCP/IP is a set of protocols that govern how data is transmitted over a network. It stands for Transmission Control Protocol/Internet Protocol and is used for communication between devices on the internet. TCP handles the transmission of data, while IP handles the addressing and routing of data packets. TCP/IP is not a network hardware or software, but rather a protocol that allows different hardware and software to communicate with each other.

    Rate this question:

  • 16. 

    TCP/IP mainly used for:

    • A.

      File Transfer

    • B.

      Email

    • C.

      Remote Login Service

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    TCP/IP is a protocol suite that is used for various purposes, including file transfer, email, and remote login service. It provides a reliable and efficient way to transfer files between computers, allows for the sending and receiving of emails, and enables remote login to access and control remote computers. Therefore, the correct answer is "All of these" as TCP/IP is used for all the mentioned purposes.

    Rate this question:

  • 17. 

    USB stands for:

    • A.

      United Serial Bus

    • B.

      Universal Serial By-Pass

    • C.

      Universal System Bus

    • D.

      Universal Serial Bus

    Correct Answer
    D. Universal Serial Bus
    Explanation
    USB stands for Universal Serial Bus. It is a common interface used for connecting computer peripherals such as keyboards, mice, printers, and storage devices to a computer. The term "universal" signifies its widespread adoption and compatibility across different devices and operating systems. "Serial" refers to the method of data transfer, where data is transmitted one bit at a time, and "bus" refers to the shared communication pathway that allows multiple devices to connect to a computer simultaneously.

    Rate this question:

  • 18. 

    In HTTPS ‘S’ is stands for:

    • A.

      Simple

    • B.

      Secured

    • C.

      Server

    • D.

      None of these

    Correct Answer
    B. Secured
    Explanation
    The 'S' in HTTPS stands for "Secured". HTTPS is a protocol used to secure the communication between a web browser and a website. It encrypts the data transmitted between the two, ensuring that it cannot be intercepted or tampered with by unauthorized parties. By using HTTPS, sensitive information such as passwords, credit card details, and personal data can be transmitted securely over the internet.

    Rate this question:

  • 19. 

    Email stands for:

    • A.

      Easy mail

    • B.

      Electronic mail

    • C.

      Electric mail

    • D.

      None of these

    Correct Answer
    B. Electronic mail
    Explanation
    The correct answer for this question is "Electronic mail" because email is an abbreviation for electronic mail. It is a method of exchanging digital messages between individuals or groups using electronic devices. The term "electronic mail" accurately describes the process of sending and receiving messages electronically, making it the most suitable option among the given choices.

    Rate this question:

  • 20. 

    In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Availability

    • D.

      Authenticity

    Correct Answer
    B. Integrity
    Explanation
    Integrity in computer security refers to the assurance that computer system assets can only be modified by authorized parties. This means that the data and information within the system remain accurate, complete, and unaltered. Maintaining integrity ensures that unauthorized individuals cannot tamper with or modify the system, protecting its reliability and trustworthiness.

    Rate this question:

  • 21. 

    WPA2 is used for security in

    • A.

      Ethernet

    • B.

      Bluetooth

    • C.

      Wi-fi

    • D.

      None of the mentioned

    Correct Answer
    C. Wi-fi
    Explanation
    WPA2 is a security protocol that is specifically designed for Wi-Fi networks. It provides encryption and authentication to ensure the confidentiality and integrity of data transmitted over Wi-Fi connections. Ethernet and Bluetooth use different security protocols, such as Ethernet using wired security protocols and Bluetooth using Bluetooth security protocols. Therefore, WPA2 is not used for security in Ethernet or Bluetooth networks. Hence, the correct answer is Wi-Fi.

    Rate this question:

  • 22. 

    Extensible authentication protocol is authentication framework frequently used in

    • A.

      Wired personal area network

    • B.

      Wireless networks

    • C.

      Wired local area network

    • D.

      None of the mentioned

    Correct Answer
    B. Wireless networks
    Explanation
    The correct answer is "wireless networks" because the Extensible Authentication Protocol (EAP) is commonly used in wireless networks to provide a secure method of authentication for devices connecting to the network. EAP allows for various authentication methods to be used, such as passwords, digital certificates, or smart cards, making it a flexible and widely adopted framework for wireless network authentication.

    Rate this question:

  • 23. 

    Pretty good privacy (PGP) is used in

    • A.

      Browser security

    • B.

      Email security

    • C.

      FTP security

    • D.

      None of the mentioned

    Correct Answer
    B. Email security
    Explanation
    PGP (Pretty Good Privacy) is a widely used encryption program that provides cryptographic privacy and authentication for data communication. It is specifically designed for securing email communication by encrypting the content of the email and ensuring that only the intended recipient can decrypt and read the message. PGP uses a combination of symmetric-key and public-key cryptography to achieve this level of security. Therefore, the correct answer is email security.

    Rate this question:

  • 24. 

    What can a firewall protect against?

    • A.

      Viruses

    • B.

      Unauthenticated interactive logins from the "outside" world

    • C.

      Fire

    • D.

      Connecting to and from the "outside" world

    Correct Answer
    B. Unauthenticated interactive logins from the "outside" world
    Explanation
    A firewall can protect against unauthenticated interactive logins from the "outside" world. This means that it can prevent unauthorized access to a network or system by blocking attempts to log in from external sources that have not been properly authenticated. By doing so, a firewall helps to ensure that only authorized users are able to access the network or system, enhancing security and protecting against potential threats or attacks.

    Rate this question:

  • 25. 

    Which of the following is system software?

    • A.

      Operating system

    • B.

      Compiler

    • C.

      Utilities

    • D.

      All of the above

    Correct Answer
    A. Operating system
    Explanation
    The correct answer is "Operating system" because it is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer. Compilers are not system software, but rather application software that translates high-level programming languages into machine language. Utilities can be both system software and application software, depending on their specific functionality. However, the question specifically asks for a system software, so the correct answer is the operating system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 06, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 15, 2016
    Quiz Created by
    Praveen26dec1985
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.