UGC NET Paper 1 — Computer Science
582 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Practice questions
21 questions shown in Cyber Security.
Given below are two statements: statement I: Denial-of-Service (DoS) attack is the large number of requests sent at the same time to the web server, thereby causing the server to c...
Which of the following statements A-E about firewalls in computer networks are true? (A) Firewalls are only available as hardware devices and only examine traffic entering a networ...
कंप्यूटर नेटवर्क में फायरवाल के संबंध में निम्न कथनों A-E में से कौन-कौन सही हैं? (A) फायरवाल केवल हार्डवेयर यंत्र के रूप में उपलब्ध हैं और ये केवल नेटवर्क में प्रवेश करने वाले यात...
Which type of virus or destructive software could appear to be useful, but will actually cause damage once installed or run by a user?
Programs that come into a computer system disguised as something else, are called:
Which of the following statements about malware are true? (A) A Trojan Horse is malware disguised as legitimate software. (B) A Virus inserts itself into another program. It runs a...
Which of the following statements is correct in the context of malware? (A) A Trojan horse is a malware that masquerades as legitimate software. (B) A virus infiltrates another pro...
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R): Assertion (A): The Internet of Things (IoT) is a rapidly evolving technolo...
What is the purpose of Block Chain?
What is Anti-spyware software?
Which of the following statements about Anti-virus software are correct? A. Problem files/programs are quarantined and can be automatically removed B. Check all files before being...
The process through which an illegitimate website pretends to be a specific legitimate website is known as:
A firewall is a software tool that protects: (i) Server (ii) Network (iii) Fire (iv) Individual Computer Choose the correct answer from the options given below:
With respect to computers, which one of the following best describes phishing?
Firewalls are used to protect a computer on a network against:
Encoding or scrambling data for transmission across a network is known as:
Encoding or scrambling data for transmission across a network is known as :
नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?
Encoding or scrambling data for transmission across a network is known as :
Encoding or scrambling data for transmission across a network is known as :
नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?