Which of the
following is considered as the unsolicited commercial email?
A.
Virus
B.
Malware
C.
Spam✔
D.
All
of the above
Which of the
following usually observe each activity on the internet of the victim, gather
all information in the background, and send it to someone else?
A.
Malware
B.
Spyware✔
C.
Adware
D.
All
of the above
_______ is a
type of software designed to help the user's computer detect viruses and avoid
them.
A.
Malware
B.
Adware
C.
Antivirus✔
D.
Both
B and C
Which one of
the following is a type of antivirus program?
A.
Quick
heal
B.
Mcafee
C.
Kaspersky
D.
All
of the above✔
It can be a
software program or a hardware device that filters all data packets coming
through the internet, a network, etc. it is known as the_______:
A.
Antivirus
B.
Firewall✔
C.
Cookies
D.
Malware
A.
Work
factor
Which of the
following is a type of independent malicious program that never required any
host program?
A.
Trojan
Horse
B.
Worm✔
C.
Trap
Door
D.
Virus
Which of the
following usually considered as the default port number of apache and several
other web servers?
A.
20
B.
40
C.
80✔
D.
87
DNS translates
a Domain name into _________
A.
Hex
B.
Binary
C.
IP
D.
URL✔
In the CIA
Triad, which one of the following is not involved?
A.
Availability
B.
Confidentiality
C.
Authenticity✔
D.
Integrity
In an any
organization, company or firm the policies of information security come
under__________
A.
CIA
Triad✔
B.
Confidentiality
C.
Authenticity
D.
None
of the above
Why are the
factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?
A.
They
help in understanding the hacking process
B.
These
are the main elements for any security breach
C.
They
help to understand the security and its components in a better manner✔
D.
All
of the above
In order to
ensure the security of the data/ information, we need to ____________ the data:
A.
Encrypt✔
B.
Decrypt
C.
Delete
D.
None
of the above
Which one of
the following is considered as the most secure Linux operating system that also
provides anonymity and the incognito option for securing the user's
information?
A.
Ubuntu
B.
Tails✔
C.
Fedora
D.
All
of the above
Which type
following UNIX account provides all types of privileges and rights which one
can perform administrative functions?
A.
Client
B.
Guest
C.
Root
D.
Administrative✔
Which of the
following is considered as the first hacker's conference?
A.
OSCON
B.
DEVON
C.
DEFCON✔
D.
SECTION
Which of the
following known as the oldest phone hacking techniques used by hackers to make
free calls?
A.
Phreaking✔
B.
Phishing
C.
Cracking
D.
Spraining
In which of the
following, a person is constantly followed/chased by another person or group of
several peoples?
A.
Phishing
B.
Bulling
C.
Stalking✔
D.
Identity
theft
Which of the
following technique is used to verify the integrity of the message?
A.
Message
digest✔
B.
Digital
signature
C.
Decryption
algorithm
D.
Protocol
Which of the
following principle is violated if computer system is not accessible?
A.
Confidentiality
B.
Availability✔
C.
Access
Control
D.
Authentication
The certificate
Authority signs the digital certificate with
A.
User's
public key
B.
User's
Private Key
C.
It's
own public key
D.
It's
own Private key✔
The number of
users on a network has the greatest impact on the network's _______
A.
Performance✔
B.
Reliability
C.
Security
D.
none
of the above
Network failure
is primarily a _______ issue.
A.
Performance
B.
Reliability✔
C.
Security
D.
none
of the above
_______ is a
network reliability issue.
A.
The
number of users
B.
The
type of transmission medium
C.
The
frequency of failure✔
D.
Unauthorized
access
_______ is a
network reliability issue.
A.
Catastrophe✔
B.
The
number of users
C.
The
type of transmission medium
D.
Unauthorized
access
Unauthorized access
is a network _______ issue.
A.
Performance
B.
Reliability
C.
Security✔
D.
none
of the above
A virus is a
network _______ issue.
A.
Performance
B.
Reliability
C.
Security✔
D.
none
of the above
Encryption
techniques improve a network's _______
A.
Performance
B.
Reliability
C.
Security✔
D.
Longevity
A _______ is
illicitly introduced code that damages a network device
A.
Protocol
B.
Virus✔
C.
Catastrophe
D.
Medium
Passwords are
used to improve the _______ of a network.
A.
Performance
B.
Reliability
C.
Security✔
D.
Longevity
Which one of
the following can be considered as the class of computer threats?
A.
Dos
Attack✔
B.
Phishing
C.
Soliciting
D.
Both
A and C
Which of the
following refers to stealing one's idea or invention of others and use it for
their own benefits?
A.
Piracy
B.
Plagiarism
C.
Intellectual
property rights
D.
All
of the above✔
Which of the
following refers to exploring the appropriate, ethical behaviors related to the
online environment and digital media platform?
A.
Cyber
low
B.
Cyberethics✔
C.
Cybersecurity
D.
Cybersafety
Which of the
following refers to the violation of the principle if a computer is no more
accessible?
A.
Access
control
B.
Confidentiality
C.
Availability✔
D.
All
of the above
Which one of
the following refers to the technique used for verifying the integrity of the
message?
A.
Digital
signature
B.
Decryption
algorithm
C.
Protocol
D.
Message
Digest✔
Which one of
the following usually used in the process of Wi-Fi-hacking?
A.
Aircrack-ng✔
B.
Wireshark
C.
Norton
D.
All
of the above
Which of the
following port and IP address scanner famous among the users?
A.
Cain
and Abel
B.
Angry
IP Scanner✔
C.
Snort
D.
Ettercap
In ethical
hacking and cyber security, there are _______ types of scanning:
A.
1
B.
2
C.
3✔
D.
4
Which of the
following is not a type of scanning?
A.
Xmas
Tree Scan
B.
Cloud
scan✔
C.
Null
Scan
D.
SYN
Stealth
In system
hacking, which of the following is the most crucial activity?
A.
Information
gathering
B.
Covering
tracks
C.
Cracking
passwords✔
D.
None
of the above
Which one of
the following is actually considered as the first computer virus?
A.
Sasser
B.
Blaster
C.
Creeper✔
D.
Both
A and C
To protect the
computer system against the hacker and different kind of viruses, one must
always keep _________ on in the computer system.
A.
Antivirus
B.
Firewall✔
C.
Vlc
player
D.
Script
Code Red is a
type of ________
A.
An
Antivirus Program
B.
A
photo editing software
C.
A
computer virus✔
D.
A
video editing software
Which of the
following can be considered as the elements of cyber security?
A.
Application
Security
B.
Operational
Security
C.
Network
Security
D.
All
of the above✔
Which one of
the following is also referred to as malicious software?
A.
Maliciousware
B.
Badware
C.
Ilegalware
D.
Malware✔
Hackers usually
used the computer virus for ______ purpose.
A.
To
log, monitor each and every user's stroke
B.
To
gain access the sensitive information like user's Id and Passwords
C.
To
corrupt the user's data stored in the computer system
D.
All
of the above✔
In Wi-Fi Security,
which of the following protocol is more used?
A.
WPA
B.
WPA2✔
C.
WPS
D.
Both
A and C
The term
"TCP/IP" stands for_____
A.
Transmission
Contribution protocol/ internet protocol
B.
Transmission
Control Protocol/ internet protocol✔
C.
Transaction
Control protocol/ internet protocol
D.
Transmission
Control Protocol/ internet protocol
The response
time and transit time is used to measure the ____________ of a network.
A.
Security
B.
Longevity
C.
Reliability
D.
Performance✔
Which of the
following factor of the network gets hugely impacted when the number of users
exceeds the network's limit?
A.
Reliability
B.
Performance
C.
Security
D.
Longevity✔
In the computer
networks, the encryption techniques are primarily used for improving the
________
A.
Security✔
B.
Performance
C.
Reliability
D.
Longevity
When was the
first computer virus created?
A.
1970
B.
1971✔
C.
1972
D.
1969
Which of the
following is considered as the world's first antivirus program?
A.
Creeper
B.
Reaper✔
C.
Tinkered
D.
Ray
Tomlinson
Which of the
following principle of cyber security restricts how privileges are initiated
whenever any object or subject is created?
A.
Least
privilege
B.
Open-Design
C.
Fail-safe
Defaults✔
D.
None
of the above
Which of the
following can also consider as the instances of Open Design?
A.
CSS
B.
DVD
Player
C.
Only
A
D.
Both
A and B✔
Which one of
the following principles states that sometimes it is become more desirable to
rescored the details of intrusion that to adopt more efficient measure to avoid
it?
A.
Least
common mechanism
B.
Compromise
recording✔
C.
Psychological
acceptability
D.
Work
factor
The term
"CHAP" stands for __________
A.
Circuit
Hardware Authentication Protocols
B.
Challenge
Hardware Authentication Protocols
C.
Challenge
Handshake Authentication Protocols✔
D.
Circuit
Handshake Authentication Protocols
Which type of
the following malware does not replicate or clone them self's through
infection?
A.
Rootkits
B.
Trojans✔
C.
Worms
D.
Viruses
Which of the
following malware's type allows the attacker to access the administrative
controls and enables his/or her to do almost anything he wants to do with the
infected computers.
A.
RATs✔
B.
Worms
C.
Rootkits
D.
Botnets
Which of the
following is just opposite to the Open Design principle?
B.
Security
through obscurity✔
C.
Least
common mechanism
D.
Least
privileges
Name of the
Hacker who breaks the SIPRNET system?
A.
John
Draper
B.
Kevin
Mitnick
C.
John
von Neumann
D.
Kevin
Poulsen✔
Which of the
following is an anti-virus program
A.
Norton
B.
K7
C.
Quick
heal
D.
All
of these✔
All of the
following are examples of real security and privacy threats except:
A.
Hackers
B.
Virus
C.
Spam✔
D.
Worm
_____________ monitors user activity on
internet and transmit that information in the background to someone else.
A.
Malware
B.
Spyware✔
C.
Adware
D.
None
of these
Viruses are
__________.
A.
Man
made✔
B.
Naturally
occur
C.
Machine
made
D.
All
of the above
Firewall is a
type of ____________.
A.
Virus
B.
Security
threat
C.
Worm
D.
None
of the above✔
Unsolicited
commercial email is known as ____________.
A.
Spam✔
B.
Malware
C.
Virus
D.
Spyware
Which of the
following is not an external threat to a computer or a computer network
A.
Ignorance✔
B.
Trojan
horses
C.
Adware
D.
Crackers
Exploring
appropriate and ethical behaviours related to online environments and digital
media.
A.
Cyber
ethics✔
B.
Cyber
security
C.
Cyber
safety
D.
Cyber
law
Which of the
following is digital certificate standard?
A.
X.508
B.
X.509✔
C.
D.509
D.
None
of the Above
2 Comments
Very Good MCQs
ReplyDeletegood mcqs
ReplyDelete