Cyber Security-IV (Module 4: System And Application Security)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Praveen26dec1985
P
Praveen26dec1985
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,373
| Attempts: 119 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. A Microsoft Windows is ….. a(n)

Explanation

The correct answer is "Operating system" because Microsoft Windows is a widely used operating system that provides a platform for running computer programs and managing hardware devices. It provides a user-friendly interface, file management system, and various utilities to perform tasks such as running applications, accessing the internet, managing files, and controlling hardware devices.

Submit
Please wait...
About This Quiz
Cyber Security-IV (Module 4: System And Application Security) - Quiz

Cyber Security-IV focuses on System and Application Security, assessing knowledge on optimizing system performance, managing software, and understanding OS fundamentals. It is crucial for learners aiming to enhance... see moretheir technical skills in system management and security. see less

2. WPA2 is used for security in

Explanation

WPA2 is a security protocol that is specifically designed for Wi-Fi networks. It provides encryption and authentication to ensure the confidentiality and integrity of data transmitted over Wi-Fi connections. Ethernet and Bluetooth use different security protocols, such as Ethernet using wired security protocols and Bluetooth using Bluetooth security protocols. Therefore, WPA2 is not used for security in Ethernet or Bluetooth networks. Hence, the correct answer is Wi-Fi.

Submit
3. You should save your computer from?

Explanation

It is important to save your computer from viruses, time bombs, and worms as they can cause significant damage to your system. Viruses are malicious software programs that can replicate themselves and infect other files, while time bombs are designed to activate at a specific time or date, causing harm to your computer. Worms are self-replicating malware that can spread across networks and cause damage. Therefore, saving your computer from all of these threats is essential to protect your data and ensure the proper functioning of your system.

Submit
4. Email stands for:

Explanation

The correct answer for this question is "Electronic mail" because email is an abbreviation for electronic mail. It is a method of exchanging digital messages between individuals or groups using electronic devices. The term "electronic mail" accurately describes the process of sending and receiving messages electronically, making it the most suitable option among the given choices.

Submit
5. TCP/IP is a:

Explanation

The correct answer is "Protocol" because TCP/IP is a set of protocols that govern how data is transmitted over a network. It stands for Transmission Control Protocol/Internet Protocol and is used for communication between devices on the internet. TCP handles the transmission of data, while IP handles the addressing and routing of data packets. TCP/IP is not a network hardware or software, but rather a protocol that allows different hardware and software to communicate with each other.

Submit
6. The …................ program compresses large files into a smaller file

Explanation

WinZip is a program that is commonly used to compress large files into smaller files. It is a popular file compression utility that allows users to reduce the size of files, making them easier to store, send, and share. By compressing files with WinZip, users can save disk space and transfer files more quickly over the internet.

Submit
7. In wireless distribution system

Explanation

The correct answer is that in a wireless distribution system, multiple access points are interconnected with each other. This means that there are multiple access points spread out in a network, and they are connected to each other to provide seamless wireless coverage and connectivity. This allows for better coverage and capacity in a larger area, as well as improved network performance and reliability.

Submit
8. MCQ MIME stands for

Explanation

MIME stands for Multipurpose Internet Mail Extensions. It is a standard that allows email messages to include various types of multimedia content, such as images, audio, and video. This extension is used to define the format of email messages and attachments, ensuring that different email clients can properly interpret and display the content.

Submit
9. USB stands for:

Explanation

USB stands for Universal Serial Bus. It is a common interface used for connecting computer peripherals such as keyboards, mice, printers, and storage devices to a computer. The term "universal" signifies its widespread adoption and compatibility across different devices and operating systems. "Serial" refers to the method of data transfer, where data is transmitted one bit at a time, and "bus" refers to the shared communication pathway that allows multiple devices to connect to a computer simultaneously.

Submit
10. Memory protection is normally done by

Explanation

Memory protection is a crucial aspect of computer systems to prevent unauthorized access or modification of memory. The responsibility of memory protection lies with the processor and the associated hardware. The hardware implements mechanisms like memory management units (MMUs) and access control lists (ACLs) to ensure that each process can only access its allocated memory and cannot interfere with other processes' memory. The processor enforces these protections by checking memory access requests against the defined permissions. The operating system, compiler, and user program may play a role in configuring these protections, but the actual implementation and enforcement are done by the processor and associated hardware.

Submit
11. What is WPA?

Explanation

WPA stands for Wi-Fi Protected Access. It is a security protocol designed to secure wireless computer networks. WPA provides stronger encryption and authentication methods compared to its predecessor, WEP (Wired Equivalent Privacy), making it more secure against unauthorized access and data breaches. By using WPA, users can ensure the confidentiality and integrity of their wireless communications, protecting their sensitive information from potential attackers.

Submit
12. Extensible authentication protocol is authentication framework frequently used in

Explanation

The correct answer is "wireless networks" because the Extensible Authentication Protocol (EAP) is commonly used in wireless networks to provide a secure method of authentication for devices connecting to the network. EAP allows for various authentication methods to be used, such as passwords, digital certificates, or smart cards, making it a flexible and widely adopted framework for wireless network authentication.

Submit
13. Which of the following operating system does not implement the multitasking truly?

Explanation

MS DOS does not implement true multitasking. Unlike the other operating systems listed, MS DOS is a single-tasking operating system, meaning it can only execute one task at a time. It does not have the capability to run multiple programs simultaneously or efficiently share system resources among different tasks.

Submit
14. TCP/IP mainly used for:

Explanation

TCP/IP is a protocol suite that is used for various purposes, including file transfer, email, and remote login service. It provides a reliable and efficient way to transfer files between computers, allows for the sending and receiving of emails, and enables remote login to access and control remote computers. Therefore, the correct answer is "All of these" as TCP/IP is used for all the mentioned purposes.

Submit
15. Disk scheduling includes deciding

Explanation

Disk scheduling involves determining the order in which disk access requests should be serviced. This means deciding the sequence in which the pending disk requests should be executed in order to optimize the disk's performance and minimize the access time. By efficiently organizing the order of disk accesses, disk scheduling algorithms aim to reduce the average seek time and enhance overall system efficiency. Therefore, the correct answer is "order in which disk access requests must be serviced."

Submit
16. If the displayed system time and date is wrong, you can reset it using

Explanation

The control panel is the correct answer because it is a feature in most operating systems that allows users to manage and customize various system settings, including the date and time. By accessing the control panel, users can easily reset the system time and date if it is displayed incorrectly.

Submit
17. In HTTPS 'S' is stands for:

Explanation

The 'S' in HTTPS stands for "Secured". HTTPS is a protocol used to secure the communication between a web browser and a website. It encrypts the data transmitted between the two, ensuring that it cannot be intercepted or tampered with by unauthorized parties. By using HTTPS, sensitive information such as passwords, credit card details, and personal data can be transmitted securely over the internet.

Submit
18. In wireless ad-hoc network

Explanation

In a wireless ad-hoc network, an access point is not required because this type of network is decentralized and does not rely on a central access point for communication. Instead, all nodes in the network can directly communicate with each other, forming a self-configuring network without the need for an access point. This allows for more flexibility and scalability in the network, as nodes can easily join or leave the network without disrupting the overall connectivity.

Submit
19. Pretty good privacy (PGP) is used in

Explanation

PGP (Pretty Good Privacy) is a widely used encryption program that provides cryptographic privacy and authentication for data communication. It is specifically designed for securing email communication by encrypting the content of the email and ensuring that only the intended recipient can decrypt and read the message. PGP uses a combination of symmetric-key and public-key cryptography to achieve this level of security. Therefore, the correct answer is email security.

Submit
20. Which is not application software?

Explanation

Windows NT is not considered application software because it is an operating system. Application software refers to programs that are designed to perform specific tasks or applications, such as Page Maker, WinWord XP, and Photoshop. Windows NT, on the other hand, is an operating system that provides the platform for running application software and managing computer resources.

Submit
21. Which of the following is system software?

Explanation

The correct answer is "Operating system" because it is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer. Compilers are not system software, but rather application software that translates high-level programming languages into machine language. Utilities can be both system software and application software, depending on their specific functionality. However, the question specifically asks for a system software, so the correct answer is the operating system.

Submit
22. Identify false statement

Explanation

not-available-via-ai

Submit
23. What can a firewall protect against?

Explanation

A firewall can protect against unauthenticated interactive logins from the "outside" world. This means that it can prevent unauthorized access to a network or system by blocking attempts to log in from external sources that have not been properly authenticated. By doing so, a firewall helps to ensure that only authorized users are able to access the network or system, enhancing security and protecting against potential threats or attacks.

Submit
24. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.

Explanation

Integrity in computer security refers to the assurance that computer system assets can only be modified by authorized parties. This means that the data and information within the system remain accurate, complete, and unaltered. Maintaining integrity ensures that unauthorized individuals cannot tamper with or modify the system, protecting its reliability and trustworthiness.

Submit
25. What is the access point (AP) in wireless LAN?

Explanation

The access point (AP) in a wireless LAN is a device that allows wireless devices to connect to a wired network. It acts as a bridge between the wireless devices and the wired network, enabling communication between them. The AP receives data from the wireless devices and forwards it to the wired network, and vice versa. This allows wireless devices to access resources and services on the wired network, such as the internet or shared files.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 6, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 06, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 15, 2016
    Quiz Created by
    Praveen26dec1985
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A Microsoft Windows is ….. a(n)
WPA2 is used for security in
You should save your computer from?
Email stands for:
TCP/IP is a:
The …................ program compresses large files into a...
In wireless distribution system
MCQ MIME stands for
USB stands for:
Memory protection is normally done by
What is WPA?
Extensible authentication protocol is authentication framework...
Which of the following operating system does not implement the...
TCP/IP mainly used for:
Disk scheduling includes deciding
If the displayed system time and date is wrong, you can reset it using
In HTTPS 'S' is stands for:
In wireless ad-hoc network
Pretty good privacy (PGP) is used in
Which is not application software?
Which of the following is system software?
Identify false statement
What can a firewall protect against?
In computer security,...
What is the access point (AP) in wireless LAN?
Alert!

Advertisement