Test Series - computer fundamental

Test Number 93/95

Q: WTLS stands for?
A. Wireless Transport Security Layer
B. Wireless Transfer System Layer
C. Wireless Transfer Security Layer
D. Wireless Transport System Layer
Solution: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.
Q: The protocol designed to make the security of wireless LAN as good as that of wired LAN.
A. WTLS
B. WEP
C. RSN
D. WP
Solution: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.
Q: A person who enjoys learning details about computers and how to enhance their capabilities.
A. Cracker
B. Hacker
C. App controller
D. Site controller
Solution: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.
Q: A program created by Farmer and Venema for auditing capability.
A. SAAS
B. SATAN
C. SAN
D. SAT
Solution: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.
Q: A small program that changes the way a computer operates.
A. Worm
B. Trojan
C. Bomb
D. Virus
Solution: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.
Q: A program that copies itself.
A. Worm
B. Virus
C. Trojan
D. Bomb
Solution: A worm copies itself from one system to another over a network without the assistance of human.
Q: An attack in which the site is not capable of answering valid request.
A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Solution: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.
Q: Creating a computer or paper audit that can help detect wrong doings.
A. Auditing
B. Validation
C. RSN
D. Verification
Solution: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.
Q: An indirect form of surveillance.
A. Honey pot
B. Logical
C. Security
D. Intrusion
Solution: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.
Q: A malicious code hidden inside a seemingly harmless piece of code.
A. Worm
B. Bomb
C. Trojan Horse
D. Virus
Solution: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.

You Have Score    /10