UGC NET Paper 1 — ICT
847 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Practice questions
43 questions shown in Cyber Security.
Identify the correct order of the following terms A-E to complete the paragraph given below that explains how data is sent securely over the Internet using the Transport Layer Secu...
Which of the following statements about email security best describes email encryption?
Identify the correct order of the following terms A-D to complete the sentences given below: The action of sending emails to fraudulently obtain another person's bank details is ca...
Given below are two statements: Statement I: A modem converts analog signals to digital signals and vice versa. Statement II: In the context of computer security, crackers are also...
In the context of Information and Communication Technologies(ICT), which of the following statements is/are true? A. In an email system, Bcc: allows the sender of a message to conc...
Below are two statements: Statement - I: A Denial-of-Service (DoS) attack is an excessive number of requests sent to a web server at the same time, causing the server to crash. Sta...
Match List - I with List - II. List - I (Cyber Attack) (A) Spyware (B) Phishing (C) Ransomware (D) Pharming List - II (Description) (I) Sending an email to lure users to fake websi...
Match List I with List II List I (Internet Term) A. Spyware B. Phishing C. Social Networking Sites D. Pharming List II (Description) I. Malicious software is installed on a user's...
Match List I with List II LIST I (Internet Term) A. Spyware B. Phishing C. Social networking sites D. Pharming LIST II (Description) I. Malicious software installed on a user's har...
Which of the following best describes a computer worm?
Which of the following is the act of obtaining a password or other confidential information from a person within an organization by using unauthorized means such as feigning an eme...
A destructive computer program that masquerades as a useful application is called
The act of obtaining passwords or other confidential information from an individual within an organization using unauthorized means, such as in a pseudo-emergency situation, is con...
Which Indian Act makes it illegal to knowingly spread a computer virus?
Miss Madhu clicks on a web link received in a message on her phone which promises her a complimentary trip to a destination of her choice. She forwarded this message to her friend,...
Given below are two statements Statement I: 'Spam' is an attempt to acquire sensitive information for malicious reasons, by masquerading as a trustworthy entity. Statement II: 'Phi...
Given below are two statements: Statement I: Piracy refers to attempts to gain information from otherwise undisclosed areas. Statement II: Hacking refers to the unauthorized duplic...
Which of the following are examples of fraudulent use of the Internet? A. Blogging B. Booking a cinema ticket C. Pharming D. Phishing Choose the correct answer from the options giv...
Match List I with List II: List I (Technical Term) (A) Phishing (B) Pharming (C) Spam (D) Smishing Choose the correct answer from the options given below:
Match List I with List II List I Ethical Issue in Information Technology A. Privacy B. Accuracy C. Property D. Accesibility List II Description I. Responsibility of data collector...
An example of a cyber exacerbated crime is
निम्नलिखित में से कौन एक साइबर उत्तेजित अपराध है ?
Using the school district's database to determine gender distribution in local schools.
Which of the following is a special type of Computer Virus that fills a computer system with self-replicating information. clogging the system so that its operations are slowed or...
Given below are two statements: Statement I: Software programs permanently stored in ROM are called 'Malware'. Statement II: The use of the Internet. Cell phones or other devices t...
Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: The Internet of Things (IOT) is a rapidly evolving technology capa...
Ankur receives an email informing him that his credit card is going to be cancelled. The email advises him to clink on the provided link and sign into his online banking account to...
Extra browser window of commercials that open automatically on browsing web pages is called:
Scrambling of data before transmission across a network to avoid manipulation by a third party is known as
Radha receives an email claiming that her credit card account is about to be suspended unless she emails her credit card details and personal identification number (PIN) immediatel...
Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: Privacy and security of user data is at stake on the Internet Reas...
Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: E-commerce companies require personal data to serve the stakeholde...
A/An _________ is a computer program that spreads by inserting copies of itself into other executable code or documents.
In the context of IT/ICT, which one of the following statements about spamming is true?
Which of the following is/are major issues arising out of the growing reliance on information technology? (a) Profitability
What is spyware in respect of computer software?
A virus type that is capable of transferring from one computer to another without any 'user interaction' is known as
Which of the following is a type of malware intentionally inserted into a software system that will setoff a malicious function when specified conditions are met?
A virus hoax is an untrue virus warning, email. When you receive a virus hoax such as the one below, what is the appropriate action? Subject: Warning! A new Virus has been detected...
निम्नलिखित दोनों कथनों को पढ़ें : I : सूचना एवं संचार प्रौद्योगिकी (आई.सी.टी.) को सूचना प्रौद्योगिकी (आई.टी.) का उपसमुच्चय माना जाता है । II : सॉफ्टवेयर के किसी हिस्से के 'उपयोग-अध...
Read the following two statements : I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT). II: The 'right to use' a piece of softw...
नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?
नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?