Q. Tick the correct Answer:- (MCQ)
1. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
2. Which of the following is promoted as useful program and , once installed , affects the computer system ?
a ) Trojan
c ) Worm
b ) Spyware
d ) Spam
3. Which of the following actions compromise cyber security?
a) Vulnerability
b) Attack
c) Threat
d) Exploit
4. What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
5. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
6. Fraudulently acquiring sensitive information from the users by impersonating trusted website is called _______.
a ) Spam
b ) Phishing
c ) Cyber - bullying
d ) Pharming
7. Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
8. Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
9. Which of these is a sort of independent type of malicious program that would not require any host program?
a. Virus
b. Trap Door
c. Worm
d. Trojan Horse
10. A ____________ can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc.
a. Firewall
b. Antivirus
c. Malware
d. Cookies
11. A fake online lottery offer is an example of-
a ) Cyber - bullying
b ) Internet fraud
or scam
c ) Phishing and Layer
d ) Pharming
12. Stealing someone's authentication details is an example of -
a ) Identity theft
b ) Internet scam
c ) Trojan
d ) Phishing
13. Spam filtering is an effective measure against ____________ .
a ) Phishers
c ) Undesired emails
b ) Pharmers
d ) Adware
14. Which of these is an antivirus program type?
a. Kaspersky
b. Quick heal
c. Mcafee
d. All of the above
15. In which of the following, a person is constantly followed/chased by another person or group of several peoples?
Phishing
Bulling
Stalking
Identity theft
16. Which of the following is considered as the unsolicited commercial email?
Virus
Malware
Spam
All of the above
17. Practices and technology used to prevent cyber crime is called :
a ) Cyber - safety
b ) Cyber - security
c ) Cyber - health
d ) Firewall
18. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
Malware
Spyware
Adware
All of the above
19. SSL stands for Secured______________ Layer.
a ) Security
b ) Software Spam
c ) Server
d ) Socket
20. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
Malware
Adware
Antivirus
Both B and C
21. Whom should children inform very first in case of cyber - bullying ?
a ) Parents
b ) Police
c ) Neighbours
d ) School Principal
22. Code Red is a type of ________
An Antivirus Program
A photo editing software
A computer virus
A video editing software
23. Which one of the following is also referred to as malicious software?
Maliciousware
Badware
Ilegalware
Malware
24. Which of the following is not a way of online user tracking over internet ?
a ) Fingerprinting
b ) Cookies
c ) Adware
d ) Online Advertising
25. The term "TCP/IP" stands for_____
Transmission Contribution protocol/ internet protocol
Transmission Control
Protocol/ internet protocol
Transaction Control protocol/ internet protocol
Transmission Control Protocol/ internet protocol
26. In the computer networks, the encryption techniques are primarily used for improving the ________
Security
Performance
Reliability
Longevity
27. A Firewall is a security combination of ___________ and ___________.
a ) virus , anti - virus
b ) SSL , HTTPS
c ) hardware ,
software
d ) Windows , MS – Office
28. When was the first computer virus created?
1970
1971
1972
1969
29. Which type of the following malware does not replicate or clone them self's through infection?
Rootkits
Trojans
Worms
Viruses
30. In order to ensure the security of the data/ information, we need to ____________ the data:
Encrypt
Decrypt
Delete
None of the above
THANK
YOU
0 Comments
Post a Comment