Here we are going to discuss top 50 css multiple choice questions. these questions will help you at the many places like in examinations. in an interview etc. So lets start--
1. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC4
B. Blowfish
C. SHA
D. MD5
Ans-A
2. Charles Babbage invented
A. ENIAC
B. Difference Engine
C. Electronic Computer
D. Punched Card
Ans-B
3. What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. SMB
Ans-(B)
4. What is the maximum character Linux supports in its filenames?
A. 8
B. 128
C. 256
D. Unlimited
Ans:-C
5. Which of the following is independent malicious program that need not any host program?
A. Trap doors
B. Trojan horse
C. Virus
D. Worm
Ans:-D
6. In tunnel mode IPsec protects the
A. Entire IP packet
B. IP header
C. IP payload
D. None of the mentioned
Ans:-A
7. A Extensible authentication protocol is authentication framework frequently used in
A. Wired personal area network
B. Wireless networks
C. Wired local area network
D. None of the mentioned
Ans:-B
8. Which of the following is known as Malicious software?
A. illegalware B. Badware
C. Malware D. Maliciousware
Ans:-C
9. Which of the following is NOT an example of a smartcard?
A. a credit card which can be used to operate a mobile phone
B. an electronic money card e.g Mondex
C. a drivers licence containing current information about bookings etc
D. an access control card containing a digitised photo
Ans:-D
10. Code red is an ----------
A. Word Processing Software
B. Antivirus
C. Virus
D. Photo Editing Software
Ans:-C
11.Firewalls are to protect against
(A) Virus Attacks (B) Fire Attacks
(C) Data Driven Attacks (D) Unauthorized Attacks
Ans:-D
12.The first computer virus is
(A) The famous (B) HARLIE
(C) PARAM (D) Creeper
Ans:-D
13.A hard copy would be prepared on a
(A) Printer (B) Joystick
(C) Trackball (D) All of these
Ans:-A
14.The first PC virus was developed in
(A) 1980 (B) 1986
(C) 1988 (D) 1999
Ans:-B
Click here more questions:- 1 2 3
Recommended post:-
- Very Cool numbers | Hacker earth solution
- Birthday party | Hacker earth solution
- Most frequent | hacker earth problem solution
- program to find symetric difference of two sets
- cost of balloons | Hacker earth problem solution
- Chacha o chacha | hacker earth problem solution
- jadu and dna | hacker earth solution
- Bricks game | hacker earth problem
- Anti-Palindrome strings | hacker earth solution
- connected components in the graph | hacker earth data structure
- odd one out || hacker earth problem solution
- Minimum addition | Hackerearth Practice problem
- The magical mountain | Hackerearth Practice problem
- The first overtake | Hackerearth Practice problem
Data structure:-
- Program to find cycle in the graph
- Implementation of singly link list
- Implementation of queue by using link list
- Algorithm of quick sort
- stack by using link list
- program to find preorder post order and inorder of the binary search tree
- Minimum weight of spanning tree
- Preorder, inorder and post order traversal of the tree
Key points:-
- How to set limit in the floating value in python
- What is boolean data type
- How to print any character without using format specifier
0 Comments