For Daily Job Alert Join Our Whats App Channel
For Free Study Material Join Our Telegram Channel

 

  • ______ is an attack technique designed to change an authentic Web page in a search engine’s index and search results pages.
    A. Proxy Hacking
    B. Keyword Stuffing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)

    Answer
    Ans – E. Both (A) and (C)
    Proxy Hacking aka Proxy Hijacking is an attack technique designed to change an authentic Web page in a search engine’s index and search results pages.
  • _______ is the practice of inserting a large number of keywords into Web content and meta tags.
    A. Proxy Hacking
    B. Keyword Stuffing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)

    Answer
    Ans – B. Keyword Stuffing
    Keyword stuffing is the practice of inserting a large number of keywords into Web content and meta tags in the attempt to artificially increase a rank of the page in search results and drive more traffic to the website.
  • ________ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
    A. dedicated server
    B. virtual server
    C. Proxy Server
    D. Cache Server
    E. None of these

    Answer
    Ans – C. Proxy Server
  • Keyword stuffing in content is also known as ______
    A. Proxy Hacking
    B. Spamdexing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)

    Answer
    Ans – B. Spamdexing
  • Which of the following is the concept of isolating a logical operating system (OS) instance from the client?
    A. Desktop Virtualization
    B. Pen Testing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)

    Answer
    Ans – A. Desktop Virtualization
  • _______ is the practice of testing a computer system, network or Web application to find vulnerabilities.
    A. Debugging
    B. Pen Testing
    C. Penetration Testing
    D. Both (A) and (B)
    E. Both (B) and (C)

    Answer
    Ans – E. Both (B) and (C)
    Penetration testing aka pen testing is the practice of testing a computer system, network or Web application to find vulnerabilities
  • _______ is surfing the Web using an inverted palette, with white text on a black body
    A. White Surfing
    B. Blue Surfing
    C. Black Surfing
    D. Bluesnarfing
    E. None of these

    Answer
    Ans – C. Black Surfing
  • _________ is the theft of information from a wireless device through a Bluetooth connection.
    A. White Surfing
    B. Blue Surfing
    C. Black Surfing
    D. Bluesnarfing
    E. None of these

    Answer
    Ans – D. Bluesnarfing
  • ________ is the integration of digital information with the user’s environment in real time. 
    A. Virtual Reality
    B. Augmented Reality
    C. Mixed Reality
    D. All of these
    E. None of these

    Answer
    Ans – B. Augmented Reality
  • _______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware
    A. Virtual Reality
    B. Augmented Reality
    C. Mixed Reality
    D. All of these
    E. None of these

    Answer
    Ans – A. Virtual Reality

 

freeapp

LEAVE A REPLY

Please enter your comment!
Please enter your name here