Information Technology Tools and Network Basics Theory Question

Overview of Futureskills and Cyber Security

  1. RPA is the use of specialized computer programs known as
    1. FutureSkills
    2. User Interface
    3. Software Robot
    4. Artificial Intelligence
    Answer : C
    Explain: Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software.
  2. Firewall is type of ?
    1. Virus
    2. threat
    3. Security
    4. Worm
    Answer : C
    Explain: A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  3. What is the full form os WPA ?
    1. Wifi Protected Access
    2. Wireless Protected Access
    3. Wired Proctected Access
    4. None of above
    Answer : A
    Explain: Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.
  4. Which of following monitors user behaviour or access to the internet and sends that information to someone.
    1. Spam
    2. Malware
    3. Spyware
    4. Adware
    Answer : C
    Explain: Spyware is a malware used to steal the user information on internet and send to someone else without the user known.
  5. What is the Full form of 'IIOT' ?
    1. Intelligence Internet of things
    2. Industrial Internet of things
    3. Internet Inactive of things
    4. Individual Internet of things
    Answer : B
    Explain: The Industrial Internet of Things (IIoT) is the collection of sensors, instruments and autonomous devices connected through the internet to industrial applications.
  6. Which of the following is not an iot device ?
    1. Arduino
    2. Tablet
    3. Table
    4. Laptop
    Answer : C
    Explain: Table is just made of wood.
  7. In which of the following years was the blockchain invented ?
    1. 2001
    2. 2020
    3. 2008
    4. 2010
    Answer : C
    Explain: blockchain was created by a person (or group of people) using the name (or pseudonym) Satoshi Nakamoto in 2008 to serve as the public distributed ledger for bitcoin cryptocurrency transactions.
  8. What will be the JAVA extension file used in IoT ?
    1. .c
    2. .py
    3. .exe
    4. .jar
    Answer : D
    Explain: JAR stands for Java ARchive
  9. Software piece of code that replicates to cause a damage in computer system
    1. Virus
    2. Bacteria
    3. Tram
    4. Spam
    Answer : A
    Explain: In computer there are some virus which replicates itself automatically.
  10. The common name for the crime of stealing passwords is ?
    1. Spoofing
    2. Identity Theft
    3. Hacking
    4. Crime
    Answer : A
    Explain: Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system and steal data.
  11. ______is a secure cloud based platform for storage, sharing and verification of documents and certificates.
    1. Amazon Web services
    2. Oracle cloud
    3. Google cloud
    4. Digilocker
    Answer : D
    Explain: DigiLocker allows user to access digital format of documents including drivers licenses, vehicle registration certificates and academic mark sheets and many more documents.
  12. Which is not firewall technique ?
    1. Packet Filter
    2. Application Gateways
    3. Proxy Server
    4. Fire Proxy Service
    Answer : D
    Explain: Firewalls is like protecting the computer from attackers.
  13. Which of following virus replicates itself in computer ?
    1. Bots
    2. Trojan Horses
    3. Worms
    4. keylogger
    Answer : C
    Explain: A worm is a computer programme that can self-replicate and damage the system with or without human intervention.
  14. Which of following is not a self replicating type of malware ?
    1. Bots
    2. Trojan Horses
    3. Worms
    4. keylogger
    Answer : B
    Explain: Trojan horse is a non replication type of malware which can damage hardf disk drive.
  15. VIRUS stands for ?
    1. Virtual Information rusting software
    2. Vital Information Resources under Siege
    3. Vital Information Resources under software
    4. None of above
    Answer : B

Next Set

2

Make sure you make notes of these question. We hope it helps you.