1.
A digital multimedia file available on the Internet to be downloaded is known as ________
Answer: Option 'B'
Podcasts
2.
Web site that uses encryption techniques to secure its data is known as _______
Answer: Option 'B'
Secure Site
3.
Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____
Answer: Option 'C'
Intrusion Detection
4.
_________ is a communication technology used by some incoming mail servers.
Answer: Option 'D'
POP
5.
A cookie that was not created by the website that attempts to access it is known as _____
Answer: Option 'C'
Third Party Cookie
6.
_______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.
Answer: Option 'B'
DNS Spoofing
7.
_______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
Answer: Option 'B'
Proxy Server
8.
________ is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
Answer: Option 'C'
Spiders
9.
_______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
Answer: Option 'C'
Keylogger
10.
_______ is surfing the Web using an inverted palette, with white text on a black body
Answer: Option 'D'
Black Surfing
11.
_________ is the theft of information from a wireless device through a Bluetooth connection.
Answer: Option 'C'
Bluesnarfing
12.
________ is the integration of digital information with the user’s environment in real time.
Answer: Option 'B'
Augmented Reality
13.
_______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware
Answer: Option 'A'
Virtual Reality
14.
__________ is a server that shares hardware and software resources with other operating systems (OS)
Answer: Option 'C'
virtual server
15.
Every computer connected to an Intranet/Extranet must have a distinct ________
Answer: Option 'C'
IP Address
16.
If you want to copy the entire disk then what command will you use?
Answer: Option 'D'
Disk Copy
17.
In a computer system, ________ is a group of servers and other resources that act like a single system and enable high availability
Answer: Option 'B'
Cluster
18.
_________ is a form of intrusion in which the attack is encoded in seemingly innocuous data.
Answer: Option 'C'
Data Driven Attack
19.
A beam of light used to record and retrieve data on optical disk is known as ________
Answer: Option 'D'
Laser
20.
A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ________
Answer: Option 'A'
data model