Quick Quiz
Questions ▼
Internet mcq in Hindi. We covered all the Internet mcq in Hindi in this post for free so that you can practice well for the exam.
Select your language and change this post to your favorite language.
Install our MCQTUBE Android App from the Google Play Store and prepare for any competitive government exams for free.
Related Posts:
- Chemistry in Everyday Life JEE Mains Questions
- Chemistry in Everyday Life Class 12 Questions and Answers
- Living World Mock Test
Mock test on the Internet for Students
Consider the following statements. I. Malware is software that performs harmful functions on a Computer. II. Important types of malware include rootkits, viruses, worms, trojan horses, and spyware. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Option b - Only II
Consider the following statements. I. A Computer virus is a program that can replicate itself and infect other computers. II. A virus can spread through removable media like USB drives, CDS, or DVDs. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Option c - Both I and II
What is malware?
a) Software used to send instant messages about events on Social networks
b) Software designed to enter a Computer system without the owner’s permission
c) Software created to improve the performance of internet-connected systems
d) Both a and b are correct
Option b - Software designed to enter a Computer system without the owner’s permission
Which of the following is the most common way malware spreads?
a) USB drives
b) Floppy disks
c) Removable storage devices
d) E-mail
Option d - E-mail
Which malware is used to control multiple infected computers through chat systems or IRC channels?
a) Keyloggers
b) Adware
c) Dialers
d) Botnets
Option d - Botnets
Which malicious program hides itself by modifying the host operating system?
a) Rootkits
b) Spyware
c) Stealware
d) Botnets
Option a - Rootkits
Which of the following is incorrectly matched?
a) Trojan horse - Malware that cannot replicate itself
b) Backdoor - Bypasses standard authentication methods
c) Beerware - Software released under a very permissive license
d) None of the above
Option d - None of the above
Which of the following correctly describes a Zombie Computer?
a) A large parallel Computer used for weather simulation
b) A grid Computer used for flight training simulations
c) An infected Computer used as a proxy to send spam and generate profit
d) None of the above
Option c - An infected Computer used as a proxy to send spam and generate profit
What is vishing in modern IT?
a) Using voice Communication to illegally obtain personal or financial information
b) Using VoIP to hack into secure sites
c) Accessing and deleting files from a system without authorization
d) Spreading worms disguised as cookies over the internet
Option a - Using voice Communication to illegally obtain personal or financial information
What is a Computer firewall?
a) Software or hardware that increases a computer's speed
b) Software or hardware that prevents crashes due to bugs
c) Software or hardware that protects against threats and secures networks
d) All of the above
Option c - Software or hardware that protects against threats and secures networks
Consider the following statements about digital signatures. I. It is an electronic record identifying the certifying authority. II. It serves as proof of identity for accessing information or services online. III. It ensures that the signed electronic document has not been altered. Which of the statements above is/are correct?
a) Only I
b) II and III
c) Only III
d) I, II, and III
Option d - I, II, and III
Consider the following software: I. NAYAN II. USB Pratirodh III. Malware Resist. Which of the above were developed by C-DAC to protect Bengaluru from cyber-attacks?
a) I, II, and III
b) I and III
c) II and III
d) Only III
Option a - I, II, and III
Consider the following pairs: I. Belle II - Artificial Intelligence experiment II. Blockchain Technology - Digital cryptocurrency III. CRISPR-Cas9 - Particle Physics. Which pair(s) are correctly matched?
a) I and III
b) Only II
c) II and III
d) I, II, and III
Option b - Only II
A person who uses their skills to gain unauthorized access to computers is called a
a) Spammer
b) Programmer
c) Hacker
d) Instant messenger
Option c - Hacker
Which application captures Network data packets, including passwords and other transmitted information?
a) Rootkits
b) Stuxnet
c) Spoofing attack
d) Packet sniffer
Option d - Packet sniffer
Which program appears to perform one function but secretly creates a backdoor for future access?
a) Keystroke logger
b) Phishing program
c) Trojan horse
d) Spam ping
Option c - Trojan horse
Which malware does not belong to the 'Greyware' category?
a) Adware
b) Spyware
c) Joke program
d) Trojan horse
Option c - Trojan horse
Consider the following statements about Beerware. I. Beerware allows the user to use or modify the source code freely. II. The term Beerware was coined by John Brixton. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Option c - Both I and II
Consider the following statements about computer worms. I. Worms can use networks to copy themselves to other computers without user intervention. II. Like viruses, worms must attach to existing programs. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Option a - Only I
Which software runs automated tasks on the internet?
a) Spam indexing
b) Spam bot
c) Web bot
d) Vishing
Option c - Web bot
We covered all the internet mcq in hindi above in this post for free so that you can practice well for the exam.
Check out the latest mcq content by visiting our mcqtube website homepage.
Also, check out: