121. Eavesdropping is a computer fraud technique to

Eavesdropping is a computer fraud technique to

listen to private voice or data transmission.
prevent the system from processing or responding to the legitimate users.
disable the network connectivity.
delete data.
This question was previously asked in
UPSC CISF-AC-EXE – 2018
The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network.
– Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow.
– It is a breach of confidentiality, one of the key principles in computer security.
– Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.
Options (B), (C), and (D) describe other types of malicious activities:
– (B) preventing the system from processing or responding to legitimate users is characteristic of a Denial-of-Service (DoS) attack.
– (C) disabling network connectivity can be a form of DoS attack or physical sabotage.
– (D) deleting data is a form of data tampering or destruction, related to breaches of integrity and availability.

122. Which one of the following is a computer security device ?

Which one of the following is a computer security device ?

Modem
Compiler
Firewall
Interpreter
This question was previously asked in
UPSC CISF-AC-EXE – 2018
A Firewall is a computer security device.
– A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
– It acts as a barrier between a trusted internal network and untrusted external networks (like the internet).
– Modems are networking devices for internet access. Compilers and Interpreters are software tools for programming languages.
Firewalls can be implemented in hardware, software, or both, and are essential for protecting networks and individual computers from unauthorized access and various forms of cyber threats.

123. Which one of the following is the correct sequence of the different st

Which one of the following is the correct sequence of the different states of a process in process management function of an operating system ?

New, Ready, Waiting, Executing, Terminating
New, Waiting, Ready, Executing, Terminating
New, Waiting, Ready, Terminating, Executing
Ready, New, Waiting, Executing, Terminating
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Option A lists the common process states in an order that represents a possible, although simplified, transition sequence in process management: New, Ready, Waiting, Executing, Terminating.
– Standard process states include: New (process being created), Ready (waiting to be assigned to a processor), Running/Executing (instructions are being executed), Waiting/Blocked (waiting for some event to occur, e.g., I/O completion), and Terminated (process has finished execution).
– A typical transition sequence is: New -> Ready -> Running -> Terminated.
– From Running, a process can go to Waiting (e.g., for I/O) or Terminated.
– From Waiting, a process goes back to Ready when the event occurs.
– While the transition Ready -> Waiting is not standard in basic models, Option A includes the key states in an order that, compared to the clearly incorrect sequences in B, C, and D, is the most plausible interpretation of a simplified or specific state model used by the question setter, where perhaps ‘Waiting’ represents a state a process enters after being Ready but before getting the CPU if certain resources are needed immediately. However, the standard transition from Waiting is back to Ready, not directly to Executing. Despite this, A lists the common states in an order that is less incorrect than the others.
The most standard simplified diagram shows transitions: New -> Ready -> Running -> Terminated, and Running <-> Waiting. A process moves from Ready to Running when scheduled, from Running to Waiting on I/O request, and from Waiting back to Ready on I/O completion. From Running, it moves to Terminated upon completion.

124. Android is a mobile operating system developed by

Android is a mobile operating system developed by

Microsoft
Google
Oracle
Infosys
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Android is a mobile operating system developed by Google.
– Android was originally developed by Android, Inc., which Google acquired in 2005.
– Google released the first commercial version of Android in September 2008.
– Android is based on a modified version of the Linux kernel and is open-source.
Android is the most widely used mobile operating system globally, powering smartphones and tablets from various manufacturers. Microsoft develops Windows (including Windows Phone/Mobile, now largely discontinued). Oracle is known for its database and enterprise software. Infosys is an IT services and consulting company.

125. Which one of the following is not a web browser ?

Which one of the following is not a web browser ?

Internet Explorer
Google Chrome
Microsoft Excel
Firefox
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Microsoft Excel is not a web browser; it is spreadsheet software.
– A web browser is application software for accessing information on the World Wide Web. Examples include Internet Explorer, Google Chrome, and Firefox.
– Microsoft Excel is part of the Microsoft Office suite and is used for organizing, analyzing, and storing data in tabular form.
Other popular web browsers include Safari, Opera, and Edge (which replaced Internet Explorer). Software like Microsoft Excel belongs to the category of productivity software.

126. Which one of the following is not an output device ?

Which one of the following is not an output device ?

Printer
Speaker
Plotter
Optical Mouse
This question was previously asked in
UPSC CISF-AC-EXE – 2018
An Optical Mouse is an input device.
– Output devices receive data from a computer and present it in a human-readable form (visual, audio, physical print, etc.). Examples include printers, speakers, and plotters.
– Input devices send data and control signals to a computer. Examples include keyboards, mice, scanners, and microphones.
– An optical mouse detects movement and clicks, sending this information as input to the computer.
Printers create hard copies of digital documents. Speakers produce sound output. Plotters are used for drawing vector graphics, typically large-scale technical drawings.

127. Which one of the following is the full form of SWAYAM, a platform laun

Which one of the following is the full form of SWAYAM, a platform launched by the Government of India to offer online courses ?

Study Webs of Active-Learning for Young Aspiring Minds
Secure Webs of Activity-Learning for Young Aspiring Minds
Structured Webs of Active-Learning for Young Aspiring Minds
Study Webs of Activity-Learning for Young Aspiring Minds
This question was previously asked in
UPSC CISF-AC-EXE – 2018
SWAYAM stands for Study Webs of Active-Learning for Young Aspiring Minds.
– SWAYAM is an online platform launched by the Ministry of Education, Government of India.
– It provides access to a wide range of courses from high school level up to post-graduation.
– The platform aims to bridge the digital divide for students who have been hitherto untouched by the digital revolution and have not been able to join the mainstream of the knowledge economy.
SWAYAM courses are offered by various national coordinators, including AICTE, NPTEL, UGC, CEC, NCERT, NIOS, IGNOU, IIMBx, and NITTTR. Courses are available free of cost, although there is a fee for certification.

128. ISO 27001 is a standard that relates to

ISO 27001 is a standard that relates to

Information Security
Quality Assurance
Infrastructure Management
Human Resource Management
This question was previously asked in
UPSC CISF-AC-EXE – 2018
ISO 27001 is an international standard for Information Security Management Systems (ISMS).
– The ISO 27000 family of standards deals with information security.
– ISO 27001 specifically provides requirements for establishing, implementing, maintaining, and continually improving an ISMS.
– An ISMS is a systematic approach to managing sensitive company information so that it remains secure.
Certification to ISO 27001 demonstrates that an organization has implemented a robust system for managing information security risks. Other ISO standards relate to quality management (ISO 9000 family), environmental management (ISO 14000 family), etc.

129. Which one of the following is not an operating system ?

Which one of the following is not an operating system ?

UNIX
Microsoft Windows
LINUX
Microsoft Access
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Microsoft Access is not an operating system. It is a database management system (DBMS).
– An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. Examples include UNIX, Windows, and Linux.
– Microsoft Access is application software used for creating and managing databases.
Operating systems provide the fundamental environment for other software to run. Microsoft Access runs on top of an operating system like Microsoft Windows.

130. Which one of the following communication media supports higher bandwid

Which one of the following communication media supports higher bandwidth ?

Coaxial cable
Fibre optic cable
CAT-5 UTP cable
Electrical cable
This question was previously asked in
UPSC CISF-AC-EXE – 2018
Fibre optic cables offer significantly higher bandwidth compared to coaxial cables, CAT-5 UTP cables, and standard electrical cables used for communication.
– Higher bandwidth means the medium can transmit more data per unit of time.
– Fibre optic cables use light signals to transmit data along glass or plastic fibres, offering extremely high speeds and large bandwidths over long distances.
– Coaxial and UTP (Unshielded Twisted Pair) cables use electrical signals over copper wires, with lower bandwidth limitations compared to fibre optics.
Fibre optic cables are widely used in modern communication networks, including backbone networks, internet infrastructure, and high-speed local area networks (LANs), due to their superior performance characteristics, including high bandwidth, low signal loss, and immunity to electromagnetic interference.