0% found this document useful (0 votes)
101 views16 pages

Cyber Security

mcq on cyber security

Uploaded by

sz1234567
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views16 pages

Cyber Security

mcq on cyber security

Uploaded by

sz1234567
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Cyber Security

_________________ is the type of rewall that is connected between the device and the network
connecting to the internet.

I. Hardware rewall
II. Software rewall
III. Microsoft rewall
IV. None of the above

Which of the following ways chief information security o cers (CISOs) are often expected to
represent the company?

I. Compliance
II. Marketing
III. Finance
IV. Operations

Which of the following means that you are protecting your data from getting disclosed?

I. Con dentiality
II. Integrity
III. Authentication
IV. Availability

Which of the following types of hackers helps in nding bugs and vulnerabilities in a system and
do not intend to crack it?

I. Black hat hackers


II. White hat hackers
III. Grey hat hackers
IV. Red hat hackers

The default port number used by Domain Name Server (DNS) is_____:

I. 80
II. 21
III. 22
IV. 53

Which of the following is a cyber law in the Indian legislature?

I. National Institute of Standards and Technology (NIST)


II. The General Data Protection Regulation (GDPR)
III. India’s Information Technology (IT) Act, 2000 (rev. 2008)
IV. International Law on Cyber Security

Which of the following can be a source of cybercrime: Internal Attack?

I. Advanced persistent threat


II. Disgruntled employee
III. Denial of service
IV. Social engineering

1
fi
fi
fi
fi
fi
fi
ffi
Which of the following is in the Open Source Foundation for Application Security (OWASP) Top 10
list?

I. Cascading Style Sheets (CSS)


II. Hypertext Markup Language (HTML)
III. Extensible Markup Language (XML)
IV. Cross Site Scripting (XSS)

_______ of information means that only authorised users are capable of accessing information.

I. Con dentiality
II. Integrity
III. Non-repudiation
IV. Availability

Data ___________ is used to ensure con dentiality.

I. Encryption
II. Sharing
III. Deleting
IV. Backup

Which of the following becomes evident in the Stuxnet attack?

I. Remote locations can be attacked.


II. Legacy systems such as SCADA can be attacked.
III. Web is not cyber-safe.
IV. Hackers are not safe from nuclear attacks.

For which of the following purposes can a computer virus be used?

I. Corrupt data in your computer


II. Log users' keystrokes
III. Access private data such as user IDs and passwords
IV. All of the above

Which command is used to measure the time taken by the packets to return from a speci c
destination sent to check connection?

I. nslookup
II. traceroute
III. ping
IV. Ifcon g

Which of the following is a data security consideration?

I. Backups
II. Archival storage
III. Disposal of data
IV. All of the above

2
fi
fi
fi
fi
What is the use of tracert command?

I. To trace the URL IP address


II. To trace the MAC address
III. To trace the path that an Internet Protocol (IP) packet takes to its destination
IV. None of the above

What are the three goals of cybersecurity?

I. Conformity, identity, and authorization.


II. Con dentiality, integrity, and availability.
III. Con dentiality, identity, authorization.

Ans (2)

Which type of security breach exploits or manipulates users into making changes to settings or
installing add-ons that allow data to be stolen?

I. Social Engineering.
II. Browser
III. Password

Ans(2)

Which mitigation strategy uses the principle of something the user knows and has?

I. Threat intelligence.
II. Browser security.
III. Multifactor authentication

Ans (3)

When using asymmetric encryption, which key shouldn't be shared?

I. Private key.
II. Public key.
III. Key pair.

Ans(1)

How many keys are required when using symmetric encryption?

I. Three
II. One
III. Two

Ans (2)

What is a hashing function?


I. A hashing function is an algorithm that creates a new ciphertext message from the plaintext.
II. A hashing function is an algorithm that's used to decrypt ciphertext from the sender.
III. A hashing function is an algorithm that creates a xed-length hexadecimal value of the
plaintext.

Ans(3)

3
fi
fi
fi
What are the three types of authentication?

I. Something you know, something you have, and something you are.
II. Something you own, something you know, something you learn.
III. Something you nd, something you are, something you know.

Ans (1)

What are the three principles of Zero Trust?

I. Verify explicitly, assume breach, and use least privileged access


II. Spear shing, pretexting, and baiting.
III. Credential stu ng, key logging, spear- shing.

Ans (1)

What is credential stu ng?

I. An attacker attempts to gain access using millions of username and password combinations
II. You use the same username and password at many sites. There's a security breach at one
site, and attackers use your compromised usernames and passwords at many other sites.
III. A dictionary of commonly used words is used for the brute force attack.

Ans (2)

What is a datagram used for?

I. A datagram is used to announce a message is ready to send across the network.


II. A datagram is a chunk of data of uniform length that can be sent across the network.
III. A datagram is used to send music data across a network.

Ans(2)

In a network, what is the fundamental building block that allows multiple devices to communicate
with each other?

I. The switch
II. The router
III. The access point

Ans(1)

What is the name of a common network attack where the cybercriminal compromises a router in
the network to eavesdrop on, or alter, data?

I. Man-in-the-middle.
II. Bluejacking.
III. Wardriving

Ans (1)

4
fi
ffi
fi
ffi
fi
What is jailbreaking?

I. When a user runs only a single application on a device at a time.


II. When a user nds a way to run multiple applications on multiple devices at the same time.
III. When a user nds uno cial methods to get full access to the core systems of the device.

Ans (3)

In the context of cybersecurity, what can be considered a device?

I. Only devices you use personally like phones, and computers.


II. Anything you can touch, as long as it doesn't connect to something else.
III. Anything you can touch but also connect to something else.

Ans(3)

What is device hardening?

I. Connecting multiple devices in a network so they can communicate.


II. Minimizing device vulnerabilities.
III. When a device is at its end of support and no longer receives updates.

Ans(2)

What is a simple way for users to mitigate threats to their applications?

I. Disable automatic updates.


II. Avoid applications that employ open-source libraries.
III. Enable automatic updates of your applications.

Ans(3)

Which statement de nes a zero-day vulnerability?

I. Any aw that is known and for which the application owner has already created a patch.
II. Any aw that is previously unknown to the application owner and unpatched.
III. Any aw that is known to the application developer but for which the developer hasn't yet
developed a patch.

Ans(2)

Which of the following is an example of application software?

I. An operating system.
II. A device driver.
III. Word processing software.

Ans(3)

WE SHOULD NOT ENFORCE OUR CYBER SECURITY POLICY TO EVERYONE.

I. TRUE
II. FALSE

5
fl
fl
fl
fi
fi
fi
ffi
_______________IS THE BEST IDEA TO SECURE OUR NETWORK FROM HACKERS.

I. SEGMENTATION
II. USING OF SINGLE LAN ONLY
III. MAKING ONLY ONE ZONE
IV. ACCESS OF INTERNAL NETWORK FROM INTERNET

FROM THE GIVEN PASSWORDS WHICH ONE IS THE BEST PASSWORD.

I. Password
II. Abc123
III. Abc%123
IV. S@nt&mLS#

WE SHOULD NEVER TURN ON AUTOMATIC UPDATES ON WINDOWS.

I. TRUE
II. FALSE

FULL FORM OF I.D.S. IS

I. INTRUSION DETECTION SYSTEM


II. INTRUSION DETECTIVE SYSTEM
III. INTRUSION DETECTION SOFTWARE
IV. INTRUSION DEFENCE SYSTEM

SOCIAL MEDIA SITES ARE _______________ FOR CRIMINALS.

I. DATA HARVESTING FIELDS


II. VERY LARGE OCEAN
III. GOLD MINES
IV. PHISHING OCEAN

BEING A NETWORK ADMINISTRATOR, THERE IS NO NEED TO MONITOR FOR THE POLICY


VIOLATIONS.

I. TRUE
II. FALSE

WE CAN PROTECT OUR DATA BY _____________

I. ENCRYPTION
II. VPN
III. FIREWALL
IV. ALL OF THE ABOVE

WHAT CAN BE USED TO SECURE OUR NETWORK ENTRANCE?


I. IDS
II. IPS
III. FIREWALL
IV. ALL OF THE ABOVE

6
THE STRING "Password1" IS A VERY GOOD PASSWORD.

I. TRUE
II. FALSE

Which of the following is de ned as a crime which is committed using a computer to steal a
person’s identity, illegal imports or malicious programs?

I. Cybercrime
II. Computer security
III. Cryptography
IV. Digital hacking

Ans(1)

_____________ is a generic term that refers to all criminal activities done using the medium of
computers, internet and worldwide web.

I. Cyber space
II. Cyber harassment
III. Cyber crime
IV. Cyber attack

Ans(3)

Cyber harassment is a distinct type of

I. Crime against person


II. Crime against other kinds
III. Crime against property
IV. Crime against government.

Ans(1)

Which of the following is not an example of cyber-crime?

I. Denial of Service
II. Man in the Middle
III. Hacking
IV. Worm attack

Ans(2)

Cyber-crime can be categorized into ________ ways.

I. ve
II. four
III. three
IV. two

Ans(4)

7
fi
fi
Which of the following is an example of a computer as a target to attack other computers?

I. Data theft
II. Denial of Services attack
III. Encryption
IV. Damage to data and systems

Ans (1)

What are the features of cybercrime?

I. Defence against internal threats


II. Criminal activities done using computer
III. Forgery of Electronic Record
IV. Unauthorized account access

Ans(2)

Cyber terrorism, credit card frauds, fraudulent electronic fund transfer are few examples of
______________

I. Data governance
II. Infrastructure Security
III. Cyber crime
IV. Data mining

Ans(3)

Software piracy, copyright infringement, trademark violations, theft of computer source code,
patent violations etc., which are essential to a business, are di erent types of _______________.

I. Intellectual property right violations


II. Information security
III. Hacking
IV. E-mail Spoo ng

Ans(1)

A computer virus that is programmed to change the data entered resulting in fraudulent bene t to
someone is called as _________________.

I. Data theft
II. Data diddling
III. Identity theft
IV. Phishing

Ans(2)

____________ is the electronic version of junk mail which involves sending unwanted messages,
often unsolicited advertising, to a large number of recipients.
I. E-mail bombing
II. IPR violations
III. Email Spamming
IV. E-mail spoo ng

Ans(3)

8
fi
fi
ff
fi
Once infected, a zombie computer allows access to admin-level operations, such as:

I. Installing and running any applications


II. Extracting information
III. Shut down a service
IV. Interruption to service

Ans(1)

Deleting data, Blocking data, Modifying data and Copying data are actions that takes place as a
malicious digital pest by way of:-

I. Denial of service
II. Trojan attack
III. Ransomware
IV. Malware

Ans(2)

__________ is a malicious digital pest whose sole aim is to wreak havoc on its victims’ computers
unnoticed and take the entire computer hostage.

I. E-mail Spoo ng
II. E-mail Spamming
III. Trojan Attack
IV. IPR Violation

Ans(3)

_____________ is a manipulation technique that exploits human error to gain private information,
access, or valuables and spread the malware infections to the restricted systems.

I. Web jacking
II. Salami attack
III. Spamming
IV. Social Engineering

Ans(4)

This type of cybercrime weapon restricts the user to access his computer system and demands
that a ransom be paid for the restriction to be removed.

I. Social Engineering
II. Web jacking
III. Ransomware
IV. Spyware

Ans(3)

9
fi
What is the category of crime where the hacker extracts money for ful lling political objectives by
taking control over another website and manipulates the information of the website?

I. Worm attack
II. Web jacking
III. Cyber terrorism
IV. Cyber space

Ans(2)

Normally, social engineering attackers tend to have a goal to lure unsuspecting users into
exposing data, spreading malware infections, or giving access to restricted systems. It is called
as:

I. Sabotage
II. Salami attack
III. Spamming
IV. Social Engineering

Ans (1)

A type of malware, which bombards computer users with unwanted endless ads and pop-up
windows that could potentially be dangerous for their device, is known as ________.

I. Ransomware
II. Adware
III. Malicious software
IV. Viruses

Ans(2)

__________ is a type malware, which hackers use to spy on people, to gain access to their
personal information, banking details or online activity.

I. Spyware
II. Malware
III. Adware
IV. Ransomware

Ans(1)

A _________ is a kind of crime, prevalent in nancial institutions for committing nancial crimes
where the invader takes small amounts of data from a le and place them in another le or alter
the data, which goes unnoticed.

I. Malicious software
II. Viruses
III. Adware
IV. Salami attack

Ans(4)

10
fi
fi
fi
fi
fi
The crime of phishing which is done by way of online nancial fraud using social engineering
techniques to commit identity theft can be prevented if we

I. Use a computer resource


II. Inform concerned service provider
III. Secure the computer systems with a password
IV. Secure the infrastructure

Ans(3)

The Sections under the Information Technology Act, 2000 applicable for phishing is:

I. Sections 43 & 66
II. Sections 43, 65 & 66
III. Sections 43A & 66
IV. Sections 43, 65 & 66C

Ans(4)

One of the technical measures that can be taken to avoid cyber stalking is:

I. Disclose personal information on the internet


II. Chat to strangers
III. Electronic communication
IV. Inform law enforcement agencies

Ans(4)

What are the Sections that are applicable for a person to be punished under the Information
Technology Act,2000 for the crime cyber stalking?

I. Sections 43 & 66
II. Sections 43A & 66A
III. Sections 43 & 44A
IV. Sections 44A & 66A

Ans(1)

The technical measures to resolve the _____________ crime is by taking strong authentication and
technical measures to prevent data leakage:

I. Intellectual property
II. Cyber stalking
III. Hacking
IV. Computer sabotage

Ans(1)

Sections applicable for a person to be punished under the Information Technology Act, 2000, for
tampering, stealing or having access to source code:
I. Sections 43 & 66
II. Sections 43, 65 & 66
III. Sections 43A & 44A
IV. Sections 43, 65A & 66

Ans(2)

11
fi
Phishing is an online nancial fraud using social engineering techniques to commit identity theft
and the compensation and punishment of imprisonment under the Information Technology
Act,2000 is:

I. up to 3 years and/or with a ne of up to 5 lakhs


II. up to 3 years and/or with a ne of up to 2 lakhs
III. up to 3 years and/or with a ne of up to 4 lakhs
IV. up to 3 years and/or with a ne of up to 3 lakhs

Ans(1)

If a person uses a computer resource to send any information that is o ensive, then the
compensation and punishment of imprisonment under the Information Technology Act,2000 is:

I. up to 2 years and/or with a ne of up to 3 lakhs,


II. up to 1 years and/or with a ne of up to 2 lakhs,
III. up to 3 years and/or with a ne of up to 5 lakhs
IV. up to 3 years and/or with a ne of up to 3 lakhs

Ans(3)

How can users ensure the security of a website when conducting transactions?

I. Use the same password for all online accounts


II. Click on links embedded in emails
III. Check for "https://" and a padlock icon
IV. Reply to spam emails

Ans(3)

What action should users take if they receive an unsolicited email requesting personal nancial
information?

I. Reply with the requested information


II. Click on provided links
III. Report it to the bank or credit card provider
IV. Ignore it

Ans(3)

What is the primary purpose of implementing automatic updates in Windows computers?

I. Backup
II. Patches
III. Encryption
IV. Spam

Ans(2)

How can users avoid overexposing their email addresses to spammers?


I. Use guessable addresses
II. Post mailing lists online
III. Keep work and personal email together
IV. Submit addresses to online services

Ans(3)

12
fi
fi
fi
fi
fi
fi
fi
fi
fi
ff
fi
Which measure helps prevent unauthorized devices from connecting to computers and potentially
carrying malware?

I. Device encryption
II. Regular backups
III. Device control
IV. Outbound content controls

Ans(2)

What precaution should users take when sending emails to multiple recipients to avoid exposing
their email addresses?

I. Use the "To" eld


II. Use guessable addresses
III. Use the "Bcc" eld
IV. Post mailing lists online

Ans(3)

Always remember not to open links in unexpected emails because the hackers may lead the users
to open malicious webpages by ___________out links via email.

I. Phishing
II. Spamming
III. Malware
IV. Loopholes

Ans(2)

To consider blocking access to certain websites in a company environment, the administration


would prevent users from accessing sites that are inappropriate for use in the workplace by
installing _________ on computers.

I. Adware
II. Malware
III. Spyware
IV. Backups

Ans(3)

A ___________ helps users to keep their personal information secure from unauthorized
communications.

I. Firewall
II. Backups
III. Loopholes
IV. Device

Ans(1)

13
fi
fi
Use passwords that are di cult to identify, make sure not to use repeated characters and keys
together on the keyboard, and always consider using a ____________.

I. programs
II. passphrase
III. backups
IV. storage

Ans(2)

The main and foremost step that a user should take is to install ________________ which prevents
receiving many phishing emails.

I. Hardware patches
II. Software patches
III. Programs
IV. Anti-spam software

Ans(4)

The most basic and important way of keeping computers secure is by choosing a secure
______________.

I. Password
II. Programs
III. Device
IV. Email

Ans(1)

_______ programs can detect unwanted emails and prevent it from reaching users’ inboxes, as
well as scan for any malware contained within the email.

I. Data base
II. Anti-spam
III. Hardware
IV. Viruses

Ans(2)

SPSS, MS SQL 2005 Analytics Services(SSAS), Oracle Data Miner(ODM) are example of:-
I. Open Source Data Mining Tools
II. Non Open Source Data Mining Tools
III. Source Data Mining Tools
IV. Non Source Data Mining Tools

Ans(2)

_____________ classi es the data item in any one of the pre-de ned classes before digging into
the hectic modelling phase of the analysis of data.

I. Classi cation
II. Clustering
III. Summarisation
IV. Anomaly Detective

Ans(1)

14
fi
fi
ffi
fi
____________ is the process of exploration and analysis, by automatic or semi-automatic means,
of large quantities of data.

I. Data analysis
II. Data Interpretation
III. Data Mining
IV. Data Science

Ans(3)

______________ technique helps to determine the most signi cant data change that has taken
place in the database.

I. Summarisation
II. Clustering
III. Anomaly Detection
IV. Classi cation

Ans(3)

Which of the following does not include Data Mining:-

I. Knowledge Discovery in Databases(KDD)


II. Knowledge extraction
III. Data Archaeology
IV. Knowledge insertion

Ans(4)

Regression, Classi cation, Clustering etc., are some of the data mining techniques which are
used for:-

I. Analysis of data
II. Variation in data
III. Assessment of data
IV. Interpretation of data

Ans(1)

____________ gives us a view of the past and present situations and an understanding of the
possible future outcomes which can give e ective results.

I. Data Mining
II. Data Analysis
III. Data Interpretation
IV. Data Science

Ans(1)

Unauthorised devices such as USB drives can carry malware which infects the computer when
plugged in, hence it is necessary to secure the data using _____________.

I. Password
II. Backups
III. Device control
IV. Programs

15
fi
fi
ff
fi
16

You might also like