Friday, June 23, 2017

MCQ - COMPUTER SECURITY - SEE 2074 [COMPUTER SCIENCE]



1.      The term computer security refers to:
Use of antivirus         Protection of software      Protection to a computer system   Use of firewall
2.      An important counter measure against data corruption or loss.
Password policy                        Defragmentation               Scan disk                     Backup system
3.      Which is not the power protection device?
UPS                                             Spike Guard                       Volt Guard                  Scan disk
4.      _______ protects the machine and peripheral devices from being damage.
Information security Hardware security             Software security              None of them
5.      To prevent the loss of data during power failures, we use:
Encryption program                 Surge protector                  Firewall                UPS
6.      _____ are used to avoid access for unauthorized users.
Logins                                         Passwords                           Encryption                  Lock and key
7.      Scan disk is used for
Removing virus                         Removing bad clusters                    Backup data        All of above
8.       _____________ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security         ii) Hardware security                          iii) Software security            iv) None of the above
9.      Some of the methods of hardware protection are:
i) Fire Alarms            ii) Security Lighting           iii)Closed-circuit cameras               iv)All of above
10.   c) The temperature in computer system should be maintained between ______to________
i)21`C to 24`C              ii) 20`C to 25`C                              iii) 23`C to 28`C                       iv) None of the above
11.    d) A device that protects your PC against power surges and spikes.
i) UPS              ii) Voltage Regulator                    iii) Surge suppressor                iv) All of the above
12.   e) The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security            ii) Hardware security                           iii) Software security                 iv) None of the above
13.                                protects the machine and peripheral hardware from theft electronic intrusion and damage.
i. Information security                      ii. Hardware security              iii. Software security                  iv. None of the above
14.   Some of the methods of hardware protection are:
i. Password security                  ii. Security lighting                          iii. Scandisk                  iv. All of the above
15.   The temperature in the computer system should be maintained between             and          .
i.68 to 72 degree Fahrenheit            ii.88 to 78 degree Fahrenheit               iii.68 to 27 degree Fahrenheit    iv. All
16.                               is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS           ii. Voltage regulator            iii. Surge processor             iv. All of the above
17.   An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS                ii. Voltage regulator       iii. Surge processor           iv. All of the above
18.                               refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation         ii. Defragmentation          iii. Scan disk       iv. All of the above
19.   An important countermeasure against data corruption or loss.
i.Password policy      ii. Defragmentation           iii. Scan disk       iv. Backup system
20.   Protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i)Information security            ii)Hardware security                    iii)Software security
21.   The temperature in the computer system should be maintained between                   to           .
i)21oC and 24oC                  ii)22oC and 25oC             iii)23oC and 26oC
22.   A device that protects your PC against power surges and spikes.
i)UPS                   ii) Voltage regulator                       iii)Surge suppressor
23.   The type of security barriers and other cyber-tools that protect programs files, and the information  flow to and from a computer.
i)Computer security                  ii)Hardware security              iii)Software security
24.   The process of loading the noncontiguous fragments of data, rearranging   the fragments and restoring  them into fewer fragments or into the whole life.
i)Fragmentation              ii)Defragmentation              iii)Scan disk
25.   Which of the following is not hardware security method?
i. Insurance     ii. Maintenance       iii. Closed-circuit cameras        iv. Hard lock key
26.   Which of the following measure allows to protect compouters being opened from unauthorized user?
i .Antivirus program      ii. Password                 iii. Debug               iv. program
27.   The computer security is purely concerned with the following
i. Hardware security            ii. software security     iii. Hardware and software security              iv. Data security
28.   Which of the following is not power supply device?
i. Volt guard               ii.UPS            iii. Constant Voltage Transformer                    iv. Power Plug
29.   Which of the following is not software security measure?
i. Virus Scanning          ii. Scandisk                  iii. Password             iv. Security Guard
30.   Common computer security is
Hardware Security           Software security        Hardware & software security        None of them
31.   Hardware security includes
Regular maintenance               Use of power of regulator devices               Both                       None of them
32.   Data and software security includes
Protection from computer virus            Cover the computer property         Both          None of them
33.   UPS is a
Voltage filtration device         Voltage processing device                             Voltage regulator device           None
34.   Scan disk is performed by using
Application software               Operating system software                            Utility software      None
35.   Backup is way of
                                     i.          Securing data and information                                            Securing internal part of the computer
                                    ii.          Securing external parts of the computer                            None of them
36.   Defragmentation is a process of
Formatting the disk         Relocation of the disk                              Relocation of the files of the disk               None of them
37.   …….protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i. information security                     ii. Hardware security                       iii. Software security
38.   The temperature in the computer system should be maintained between …. to ….
i.21 to 24                            ii.22 to 25                           ii.23 to 26          
39.   A device that protects your PC against power surges and spikes.
i. Uninterruptible Power Supply                         ii. Voltage regulator      iii. Surge suppressor
40.   The type of security that provides barriers and other cyber tools that protects program, files, and the information flow to and from a computer
i. computer security          ii. Hardware security                       iii. Software security
41.   The ………. Process optimize the read/write process by realigning the speed posiyion of related file clusters to speed up the overall operation of the drive
i. Fragmentation                        ii. Defragmentation                          iii. Scan disk
42.   Which device protects hardware?
i) UPS           ii) MODEM         iii) Gateway        iv) All of the above
43.   Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging           ii. Backup        iii. Defragmentation      iv. Scandisk
44.   Process of arranging the scattered parts of file into a contiguous manner.
        i) Backup            ii) Defragmentation          iii) Debugging     iv) All of the above


1 comment:

  1. Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download Now

    >>>>> Download Full

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download LINK

    >>>>> Download Now

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download Full

    >>>>> Download LINK vh

    ReplyDelete