Q. Tick the correct Answer:- (MCQ)

1. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?


a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack

 

2. Which of the following is promoted as useful program and , once installed , affects the computer system ?

a ) Trojan

c ) Worm

b ) Spyware

d ) Spam

 

3. Which of the following actions compromise cyber security?


a) Vulnerability
b) Attack
c) Threat
d) Exploit

 

4. What is Cyber Security?


a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned

 

5. What does cyber security protect?


a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

 

6. Fraudulently acquiring sensitive information from the users by impersonating trusted website is called _______.

a ) Spam

b ) Phishing

c ) Cyber - bullying

d ) Pharming

 

7. Who is the father of computer security?


a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles

 

8. Which of the following is a type of cyber security?


a) Cloud Security
b) Network Security
c) Application Security
d) All of the above

 

9. Which of these is a sort of independent type of malicious program that would not require any host program?

a. Virus

b. Trap Door

c. Worm

d. Trojan Horse

 

10. A ____________ can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc.

a. Firewall

b. Antivirus

c. Malware

d. Cookies

 

11. A fake online lottery offer is an example of-

a ) Cyber - bullying

b ) Internet fraud or scam

c ) Phishing and Layer

d ) Pharming

 

12. Stealing someone's authentication details is an example of -

a ) Identity theft

b ) Internet scam

c ) Trojan

d ) Phishing

 

13. Spam filtering is an effective measure against ____________ .

a ) Phishers

c ) Undesired emails

b ) Pharmers

d ) Adware

 

14. Which of these is an antivirus program type?

a. Kaspersky

b. Quick heal

c. Mcafee

d. All of the above

 

15. In which of the following, a person is constantly followed/chased by another person or group of several peoples?

Phishing

Bulling

Stalking

Identity theft

 

16.  Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

 

17. Practices and technology used to prevent cyber crime is called :

a ) Cyber - safety

b ) Cyber - security

c ) Cyber - health

d ) Firewall

 

18. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

Malware

Spyware

Adware

All of the above

 

19. SSL stands for Secured______________ Layer.

a ) Security

b ) Software Spam 

c ) Server

d ) Socket

 

20. _______ is a type of software designed to help the user's computer detect viruses and avoid them.

Malware

Adware

Antivirus

Both B and C

 

21. Whom should children inform very first in case of cyber - bullying ?

a ) Parents

b ) Police

c ) Neighbours

d ) School Principal

 

22. Code Red is a type of ________

An Antivirus Program

A photo editing software

A computer virus

A video editing software

 

23. Which one of the following is also referred to as malicious software?

Maliciousware

Badware

Ilegalware

Malware

 

24. Which of the following is not a way of online user tracking over internet ?

a ) Fingerprinting

b ) Cookies

c ) Adware

d ) Online Advertising

 

25. The term "TCP/IP" stands for_____

Transmission Contribution protocol/ internet protocol

Transmission Control Protocol/ internet protocol

Transaction Control protocol/ internet protocol

Transmission Control Protocol/ internet protocol

 

26. In the computer networks, the encryption techniques are primarily used for improving the ________

Security

Performance

Reliability

Longevity

 

27. A Firewall is a security combination of ___________ and ___________.

a ) virus , anti - virus

b ) SSL , HTTPS

c ) hardware , software

d ) Windows , MS – Office

 

28.  When was the first computer virus created?

1970

1971

1972

1969

 

29. Which type of the following malware does not replicate or clone them self's through infection?

Rootkits

Trojans

Worms

Viruses

 

30. In order to ensure the security of the data/ information, we need to ____________ the data:

Encrypt

Decrypt

Delete

None of the above

 

 

 THANK

YOU