mission patwari 2020 - gillzmentortest.com · an embedded device to control its functions. a. proxy...
TRANSCRIPT
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL
PATWARI COMPUTER MCQ
PART- 6
1.______ is a small-scale data center or cluster of computers designed to provide cloud computing services to mobile devices. A. Sub B. Intelligent C. Drone D. Cloudlet E. None of these
Answer Ans – D. Cloudlet A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity
2.______ is an exploit that takes advantage of a vulnerable device to gain access to a network. A. Device Attack B. Edge Computing C. Drone D. Cloudlet E. None of these Answer Ans – A. Device Attack Device Attack is an exploit that takes advantage of a vulnerable device to gain access to a network.
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
3.______ is the exploiting of vulnerabilities in embedded software to gain control of the device. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – B. Embedded Device Hacking
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
4._______ is the flash memory chip that stores specialized software running on a chip in an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – D. Embedded Firmware
5. _______ is a device which serves as the connection point between IoT devices and the cloud A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)
Answer Ans – B. IoT Gateway
6. ________ is software that serves as an interface between components of the IoT. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020 Answer Ans – C. IoT Middleware IoT Middleware is software that serves as an interface between components of the IoT
7. ______ is a group of hacked computers, smart appliances, and Internet-connected devices that have been co-opted for illicit purposes. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C) Answer Ans – A. IoT Botnet
8._________ is a larger transmission line that carries data gathered from smaller lines that interconnect with it. A. Backbone B. Intelligent C. Drone
D. Cloudlet E. None of these Answer Ans – A. Backbone
9.Which of the following is the combination of Bridge and Router? A. Backbone B. Brouter C. Baseband D. Cloudlet E. None of these Answer Ans – B. Brouter
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
10. Which of the following forwards packets to computer hosts within a network but not between networks? A. Edge Router B. Core Router C. Backbone D. All of these E. None of these Answer Ans – B. Core Router
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
11._______ is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing A. Cache B. Tracking C. Cookie D. Server Free Backup E. None of these
Answer
Ans – C. Cookie Cookie is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
12.Which of the following is a cookie that is automatically recreated after being deleted? A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – C. Zombie Cookie Zombie Cookie is a cookie that is automatically recreated after being deleted
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
13.________ exists only in temporary memory while the user navigates the website. A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – D. Session Cookie
14.Session Cookie is also known as ____. A. Super Cookie
B. Transient Cookie C. In-memory Cookie D. Both (A) and (B) E. Both (B) and (C)
Answer
Ans – E. Both (B) and (C)
15.______ expires at a specific date or after a specific length of time A. Super Cookie B. Persistent Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – B. Persistent Cookie
16.Persistent cookies are sometimes referred to as ______ A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Both (B) and (C)
Answer
Ans – D. Tracking Cookie Persistent cookies are sometimes referred to as Tracking Cookies.
17.A _________ can only be transmitted over an encrypted connection
A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
Answer
Ans – E. Secure Cookie
18.________is a cookie with an origin of a top-level domain A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
Answer
Ans – A. Super Cookie
19.________ cannot be accessed by client-side APIs, such as JavaScript. A. Super Cookie B. HTTP Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
Answer
Ans – B. HTTP Cookie
20.A cookie consists of ______ A. Name B. Value C. Zero or More Attributes D. All of these E. None of these
Answer
Ans – D. All of these
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL