Hssc Computer Health Department Exam 2016 (Shift-I)Total Questions: 10021. Fire walls can not provide(1) Protection against viruses originated from Infected USB flash drives.(2) Protections against Unauthenticated interactive logins.(3) Protection against network borne attacks(4) None of the optionsCorrect Answer: (1) Protection against viruses originated from Infected USB flash drives.Solution:Firewall is a protection against virsus originated from infected USB flash drives.22. What does the term 'DMZ' in computer network stand for-(1) Data base Manage zone(2) Demilitarized zone(3) Data Militarized zone(4) Database Migrate zone.Correct Answer: (2) Demilitarized zoneSolution:DMZ = Dimilitarized Zone.23. Examples of system software Includes.(1) Operating systems(2) Utility programs(3) Compilers(4) All of the optionsCorrect Answer: (3) CompilersSolution:23. System of software has twoparts:-1. Operating system -Windows, Unix, LINEX2. Language translator-Compiler, Assembler Interpreter.24. Which of the following user interface you need to open to uninstall a program from your windows 8 system.(1) Internet Explorer(2) Control Panel(3) Window Explorer(4) Recycle BinCorrect Answer: (2) Control PanelSolution:In window 8 system you need to open a control Panel user Interface to Uninstall a program.25. An attribute or a combination of attributes in one table whose values must either match the primary key in an-other table or be null is called______(1) Secondary key(2) Super key(3) Candidate key(4) Foreign keyCorrect Answer: (4) Foreign keySolution:Foreign Key.26. Identify the odd one(1) Moniter(2) Printer(3) Speaker(4) KeyboardCorrect Answer: (4) KeyboardSolution:Monitor, Printer, Speaker, are output device and keyуboard is input device.27. A USB protocol is a______ channel(1) Simplex(2) half duplex(3) Full duplex(4) Both simplex & half duplexCorrect Answer: (3) Full duplexSolution:A USB protocol is a full duplex channel (USA-universal serial bus)28. The distance between the affects the size of the projected contents on an LCD proJector.(1) Projector & wall(2) Projector & Screen(3) Projector & audience(4) None of the optionsCorrect Answer: (2) Projector & ScreenSolution:The distance between projector & screen affects the size of the protected content on a LCD projector.29. The security provided by inter-net protocol security (IPsec) work at.(1) Transport layer(2) Network layer(3) Application layer(4) Session layerCorrect Answer: (4) Session layerSolution:Session layer is fifth layer of OSI model. This layer makes session establish between sender & receiver.30. Wireless protected Access 2 (WPA2) security authentication(1) Ethernet(2) Bluetooth(3) Wifi(4) All of the optionsCorrect Answer: (3) WifiSolution:Wireless protected Access (WPAZ) security authentication is used in wifi.Submit Quiz« Previous12345678910Next »