ICICI Bank PO Previous year solved papers

Books For Preparation



Solved question paper of ICICI Bank PO


ICICI Bank PO 2010 Computer Awareness Solved Paper


Page1        Page2

1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C


2. The survey showed that these businesses lost more than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B


3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B


4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B


5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer


6. Collecting personal information and effectively posing as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B


7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B


8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate


9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B


10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A


11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B


12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A


13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C


14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C


15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C


17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No


18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D


19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D


20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A


21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B


22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D


23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B


24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A


25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D


ICICI Bank po solved papers


Click here

No comments:

Post a Comment

Followers