Skip to content
Early access — you're among the first to try PYQLabs. Share feedback

UGC NET Paper 1Computer Science

582 questions across 12 years

Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.

By year

By topic

Practice questions

21 questions shown in Cyber Security.

Showing Cyber Security questions.
2023 Q33

Given below are two statements: statement I: Denial-of-Service (DoS) attack is the large number of requests sent at the same time to the web server, thereby causing the server to c...

Cyber Security
2023 Q34

Which of the following statements A-E about firewalls in computer networks are true? (A) Firewalls are only available as hardware devices and only examine traffic entering a networ...

Cyber Security
2023 Q35

कंप्यूटर नेटवर्क में फायरवाल के संबंध में निम्न कथनों A-E में से कौन-कौन सही हैं? (A) फायरवाल केवल हार्डवेयर यंत्र के रूप में उपलब्ध हैं और ये केवल नेटवर्क में प्रवेश करने वाले यात...

Cyber Security
2022 Q30

Which type of virus or destructive software could appear to be useful, but will actually cause damage once installed or run by a user?

Cyber Security/Hindi/answer key
2022 Q32

Programs that come into a computer system disguised as something else, are called:

Cyber Security/answer key
2022 Q33

Which of the following statements about malware are true? (A) A Trojan Horse is malware disguised as legitimate software. (B) A Virus inserts itself into another program. It runs a...

Cyber Security/answer key
2022 Q33

Which of the following statements is correct in the context of malware? (A) A Trojan horse is a malware that masquerades as legitimate software. (B) A virus infiltrates another pro...

Cyber Security/Hindi/answer key
2022 Q34

Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R): Assertion (A): The Internet of Things (IoT) is a rapidly evolving technolo...

Cyber Security/answer key
2022 Q35

What is the purpose of Block Chain?

Cyber Security/answer key
2021 Q32

What is Anti-spyware software?

Cyber Security/answer key
2021 Q34

Which of the following statements about Anti-virus software are correct? A. Problem files/programs are quarantined and can be automatically removed B. Check all files before being...

Cyber Security/answer key
2020 Q32

The process through which an illegitimate website pretends to be a specific legitimate website is known as:

Cyber Security
2020 Q33

A firewall is a software tool that protects: (i) Server (ii) Network (iii) Fire (iv) Individual Computer Choose the correct answer from the options given below:

Cyber Security
2019 Q44

With respect to computers, which one of the following best describes phishing?

Cyber Security/answer key
2018 Q45

Firewalls are used to protect a computer on a network against:

Cyber Security/answer key
2015 Q8

Encoding or scrambling data for transmission across a network is known as:

Cyber Security
2015 Q29

Encoding or scrambling data for transmission across a network is known as :

Cyber Security
2015 Q29

नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?

Cyber Security
2015 Q37

Encoding or scrambling data for transmission across a network is known as :

Cyber Security
2015 Q43

Encoding or scrambling data for transmission across a network is known as :

Cyber Security
2015 Q43

नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?

Cyber Security