A program that quietly opens secret access for an attacker is commonly called a A Disk cleanup utility B Screen
Continue readingCategory: 1. Common Subject
Chapter 8: Cyber Threats (Set-2)
When many infected devices are controlled together by an attacker, it is called a A Safe backup group B Botnet
Continue readingChapter 8: Cyber Threats (Set-1)
Malware is best described as software that is made to A Improve device speed B Increase screen brightness C Organize
Continue readingChapter 7: Internet and Internet Terminology (Set-5)
When DNS returns an old IP because of stored results, the setting that controls how long it stays valid is
Continue readingChapter 7: Internet and Internet Terminology (Set-4)
While typing a website, your browser suggests older addresses mainly using A Browser history database B Cached images folder C
Continue readingChapter 7: Internet and Internet Terminology (Set-3)
When a website name is typed, the readable name is converted into numbers using A DNS translation service B Screen
Continue readingChapter 7: Internet and Internet Terminology (Set-2)
When you type a website name and press Enter, the browser first tries to contact A Keyboard driver chip B
Continue readingChapter 7: Internet and Internet Terminology (Set-1)
The Internet mainly allows computers to share data across A A local room only B One software app C A
Continue readingChapter 6: Computer Networking (Set-5)
A network link feels “slow” despite high bandwidth mainly due to A Low screen refresh B Small hard disk C
Continue readingChapter 6: Computer Networking (Set-4)
A small office wants central user control and backups; best model is A Peer-to-peer network B PAN connection C Ring-only
Continue reading