Cyber Security MCQ Questions and Answers, prepared by SONU Hutson (GK Editorial), Re-Edite by Sudip Kumar Chouhan, Suraj Rabidas and Podmeswar Bora, Only for fair use


 

1. What is the full form of LDAP?

A. Light Weight Directory Access Provider

B. Light Weight Directory Access Protocol

C. Light Weight Directory Access Program

D. Light Weight Directory Access Protection

Ans. b

 

2. What is called the collective terms of malicious software, such as viruses, worms and trojans?

A. Spam

 B. Phishing

C. Malware

D. Harm

Ans. C

 

3. What is the full form of CIA under information security?

A. Confidentiality Integrity Availability

B. Criminal Investigation Agency

C. Cost Information Agency

D. Credit Integrity Assement

Ans. a

 

4. What is called a single point of access for several networking services?

A. Phishing

 

B. Web service

C. Directory service

D. Worms

Ans. c

 

5. Which activities endanger the sovereignty and integrity of nation?

A. Cyber Terrorism

B. Cyber vandalism

C. Cyber squatting

D. Carding

Ans. a

 

6. Which crime involves the use of computer networks to create, distribute or access materials tha sexually expoit underage persons?

A. Assault by Threat

B. Cyber squatting

C. Cyber vandalism

D. Child pornography

Ans. d

 

7. Which method go through all the files or network elements with an intention to detect something unusual?

A. Probing

B. Phishing

C. Infecting

 

D. Scanning

Ans. d

 

8. Victims of cyber attack might loose _______.

(a) data

(b) money

(c) both a & b

(d) none of them

Ans. c

 

9. Under information security, CIA stands for _______.

(a) Criminal Investigation Agency

(b) Confidentiality, Integrity, Availability

(c) Cost Information Agency

(d) Credit Integrity Assessment

Ans. b

 

10. Script files sent mostly through email attachment to attack host computer are called ______.

(a) Worms

(b) Phishing attacks

(c) Trojans

(d) Computer Viruses

Ans. a

 

11. Attacking the victims through fake URL resembling that of a valid financial Institution is called_____ .

(a) Worms

(b) Phishing attack

(c) Trojans

(d) Computer Viruses

Ans. b

 

12. A malicious program spreading through Internet and storage media and attacking the data in victims computer is called_______.

(a) Worms

(b) Phishing attack

(c) Trojan

(d) Computer Virus

Ans. d

 

13. To protect the network infrastructure from vulnerability, _____ is setup.

(a) firewall

(b) Internet security software

(c) both a & b

(d) none of them

Ans. c

 

14. The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim is called ______ .

(a) hacker

(b) cracker

 

(c) maker

(d) taker

Ans. a

15. Periodic assessment of security vulnerability in computer systems is called _______audit.

(a) threat

(b) attack

(c) hacking

(d) security

Ans. d

 

16. To ensure information safety, ________should be implemented.

(a) physical access security

(b) password access security

(c) secure IT infrastructure

(d) all of them

Ans. d

 

17. Protecting access to a computer through________ is called access control.

(a) physical restriction of entry

(b) password security for login

(c) both a & b

(d) none of them

Ans. c

 

18. Security should be implemented at the stage of ______in software.

(a) development stage

(b) entire life cycle

(c) Sofware Development Life Cycle (SDLC)

(d) all of them

Ans. d

 

19. SDLC in software development stands for _____.

(a) Software Development Life Circus

(b) Software Development Life Cycle

(c) Software Drafting Life Cycle

(d) Software Development Lead Cycle

Ans. b

 

20. Protection from______ of source code means non-disclosure of the source code to outsiders.

(a) disclosure

(b) alteration

(c) destruction

(d) log of changes (whois making request)

Ans. a

 

21. _______of access rights in source code development means verification of role before permitting access to source code.

(a) verification

(b) maintaining historical records

(c) error handling

(d) log of changes (whois making request)

Ans. a

 

22. _____in source code development means handling of configuration errors, session errors and exceptions.

(a) verification

(b) maintaining historical records

(c) error handling

(d) log of changes (whois making request)

Ans. c

 

23. Protecting the data divulged by customers from unauthorized access is called____.

(a) privacy protection

(b) audit

(c) antinvirus

(d) vulnerability

Ans a

24. Information on criminal records of individuals, financial data of companies, genetic information, address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of debit card, netbanking details, etc. are classified under ______.

(a) privacy protection

(b) audit

(c) antinvirus

(d) vulnerability

Ans. a

 

25. Information security audit may be conducted with reference to _____ .

(a) vulnerabilities

(b) threats

(c) preventive measures

(d) all of them

Ans. d

 

26. Any single employee ______hold all data needed for making a complete financial transaction.

(a) should not

(b) should

(c) may

(d) might

Ans. a

27. IT audit of the firm should be conducted periodically, which may be every______ .

(a) fortnight

(b) month

(c) quarter

(d) all of them

Ans. d

28. IT act aims to_______ .

(a) protect victims of cyber fraud

(b) punish misbehious involving technology

(c) both a & b

(d) none of them

Ans. c

29. _____ can keep unwanted ads to show up?

a) Adware

b) Hardware

c) Malware

d) Spyware

Ans.a

 

30. ______ servers provides a central storeroom for storing and managing information?

a) Clint b) Directory

c) Post d) Group

Ans. b

 

31. ______ generally refers to a system that can control, monitor and restrict the movement of people, assets or vehicles, in, out and around a building or site?

a) Access control

b) Security Guard

c) Form Denial

d) None

Ans. a

 

32. Which chapter of the IT awareness Act talks about electronic governance?

a) 4

b) 3

c) 2

d) 1

Ans. b

 

 

33. Chapter 7 of the IT awareness act deals with?

a) E- Commerce

b) Electronic Governance

c) Digital Signature

d) None

 Ans. c

34. Which chapter of the IT awareness act talks about penalities and adjudication?

a) 5

b) 7

c) 11

d) 9

Ans. d

 

35. The IT awareness act addresses which of the following issues?

a) Legal recognition of electronic documents

b) Legal Recognition of digital signatures

c) Offenses and contraventions

d) All of the above

Ans. d

 

36. Why would a hacker use a proxy server?

a) To create a stronger connection with the target

b) To create a ghost server on the network.

c) To obtain a remote access connection.

 

d) To hide malicious activity on the network.

Ans. d

 

37. To hide information inside a picture, what technology is used?

a) Rootkits

b) Bitmapping

c) Steganography

d) Image Rendering

Ans. c

 

38. Which phase of hacking performs actual attack on a network or system?

a) Reconnaissance

 b) Maintaining Access

c) Scanning

d) Gaining Access

Ans. d

 

39.The first phase of hacking an IT system is compromise of which foundation of security?

a) Availability

b) Confidentiality

c) Integrity

d) Authentication

Ans. b

40. What is the purpose of a Denial service attack?

 

a) Exploit a weakness in the TCP/IP stack

b) To execute a Trojan on a system

c) To overload a system so it is no longer operational

d) To shutdown services by turning them off

Ans. c

 

41. Performing hacking activities with the intent of gaining visibility for an unfair situation is called_______.

a) Cracking

b) Analysis

c) Hacktivism

d)Exploitation

Ans. c

 

42. What is the most important activity in system hacking?

a) Information gathering

b) Cracking passwords

 c) Escalating privileges

d) Covering tracks

Ans. b

43. Phishing is a form of _______.

a) Spamming

b) Identify Theft

c) Impersonation

d) Scanning

 Ans. c

 

44. Why would HTTP Tunneling be used?

a) To identify proxy servers

b) Web activity is not scanned

c) To bypass a firewall

d) HTTP is a easy protocol to work with

Ans. c

45. Keyloggers are a form of _______.

a) Spyware

b) Shoulder surfing

c) Trojan

d) Social engineering

Ans. A

 

46. _____ is a popular tool used for discovering networks as well as in security auditing.

a) Ettercap

b)Metasploit

c) Nmap

d) Burp Suit

Ans. c

 

47. Which of the below mentioned tool is used for Wi-Fi hacking?

a) Wireshark

b) Nessus

c) Aircrack-ng

d) Snort

Ans. c

 

48. ______ is a web application assessment security tool.

a) LC4

b) Weblnspect

c) Ettercap

d) QualysGuard

Ans. b

 

49. All of the following are example of real security and privacy threats except:

a) Hackers

b) Virus

c) Spam

d) Worm

Ans. c

 

50. Viruses are _______.

a) Man made

b) Naturally occur

c) Machine made

d) All of the above

Ans. a

 

 

51. Firewall is a type of ______.

a) Virus

b) Security Threat

c) Worm

d) None of the above

Ans. d

 

52. Unsolicited commercial email is known as _____.

a) Spam

b) Malware

c) Virus

d) Spyware

Ans. a

 

53. Which of the following is not an external threat to a computer or a computer network.

a) Ignorance

b) Trojan horses

c) Adware

d) Crackers

Ans. a

 

54. A license allow a user to use copyrighted material.

a) True

b) False

Ans. a

 

55. It allow a visited website to store its own information about a user on the user‟s computer.

a) Spam

b) Cookies

c) Malware

d) Adware

Ans. b

 

56. Hacking a computer is always illegal and punishable by law.

a) True

b) False

Ans. a

 

57. Exploring appropriate and ethical behaviours related to online environments and digital media.

a) Cyber ethics

b) Cyber security

c) Cyber safety

d) Cyber law

Ans. a

58. Which of the following principle is violated if computer system is not accessible?

a) Confidentiality

b) Availability

c) Access Control

d) Authentication

Ans. b

59. The certificate Authority signs the digital certificate with

a) User‟s public key

b) User‟s Private key

c) It‟s own public key

d) It‟s own private key

Ans. d

60. Unauthorized access is a network ____ issue.

a) Performance

b) Reliability

c) Security

d) none of the above

Ans. c

 

61. A virus is a network_____ issue.

a) Performance

b) Reliability

c) Security

d) none of the above

Ans. c

 

62. Encryption techniques improve a network‟s ______

a) Performance

b) Reliability

c) Security

 

d) Longevity

Ans. c

 

63. A _____ is illicitly introduced code that damages a network device.

a) Protocol

b) Virus

c) Catastrophe

d) Medium

Ans. b

 

64. Unauthorized access and viruses are issues dealing with network______

a) Performance

b) Reliability

c) Security

d) none of the above

Ans. c

 

65. A company changes its network configuration so that only one router instead of two can access the internet. The greatest impact will be on the _____ of the network.

a) Performance

b) Reliability

c) Security

d) none of the above

Ans. c

 

 

66. A company requires its users to change passwords every month. This improves the _____ of the network.

a) Performance

b) Reliability

c) Security

d) none of the above

Ans. c

 

67. A company requires each employee to power off his computer at the end of the day. This rule was implanted to make the network _______.

a) Perform better

b) more reliable

c) more secure

d) more error-free

Ans. c

 

68. A firewall is a

a) Wall build to prevent fires from damaging a corporate intranet

b) security device deployed at the boundary of a company to prevent unauthorized physical access

c) security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

d) device to prevent all accesses from the internet to the corporate intranet

Ans. c

 

69. A firewall may be implemented in

 

 

a) routers which connect intranet to internet

b) bridges used in an intranet

c) expensive modern

d) user‟s application programs

Ans. a

 

70. Firewall as part of a router program

a) filters only packets coming from internet

b) filters only packets going to internet

c) filters packets travelling from and to the intranet from the internet

d) ensures rapid traffic of packets for speedy e-Commerce

Ans. c

 

71. Main function of proxy application gateway firewall is

a) to allow corporate users to use efficiently all internet services

b) to allow intranet users to securely use specified internet services

c) to allow corporate users to use all internet services

d) to prevent corporate users from using internet services

Ans. b

 

72. A hardened firewall host on an intranet

(i) has a proxy application gateway program running on it

(ii) Allow specified internet users to access specified services in the intranet

(iii) Initiates all internet activities requested by client and monitors them

 

(iv) prevents outsiders from accessing IP addresses within the intranet A. i, ii B. i, ii, iii C. i, ii, iii, iv D. ii, iii, iv

Ans. c

 

73. By encryption of a text we mean

A. compressing it

B. expanding it

C. scrambling it to preserve its security

D. hashing it

Ans. c

 

74. Encryption is required to

(i) protect business information from eavesdropping when it is transmitted on internet

(ii) efficiently use the bandwidth available in PSTN

(iii) to protect information stored in companies‟ databases from retrieval

(iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it A. i and ii B. ii and iii C. iii and iv D. i and iv

Ans. d

 

75. Encryption can be done

a) only on textual data

b) only on ASCII coded data

c) on any bit string

d) only on mnemonic data

Ans. c

 

76. By symmetric key encryption we mean

a) one private key is used for both encryption and decryption

b) private and public key used are symmetric

c) only public keys are uses for encryption

d) only symmetric key is used for encryption

Ans. a

 

77. The Acronym DES stands for

a) Digital Evaluation System

b) Digital Encryption Standard

c) Digital Encryption System

d) Double Encryption Standard

Ans. B

 

78. DES(i) is a symmetric key encryption method (ii) guarantees absolute security (iii) is implemented as hardware VLSI chip (iv) is a public key encryption method

a) i and ii

b) ii and iii

c) i and iii

d) iii and iv

Ans. c

 

79. Triple DES

a) is a symmetric key encryption method

 

 

b) guarantees excellent security

c) is implementable as a hardware VLSI chip

d) is public key encryption method with three keys.

Ans. b

 

80. Message can be sent more securely using DES by

a) encryption plain text by a different randomly selected key for each transmission

b) encryption plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

c) using an algorithm to implemented DES instead of using hardware

d) designing DES with high security and not publicizing algorithm used by it

Ans. b

81. DES and public key algorithm are combined (i) to speed up encryption message transmission (ii) to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv) as it is required in e-Commerce

a) i and ii

b) ii and iii

c) iii and iv

d) i and iv

Ans. a

 

82. A digital signature is

a) a bit string giving identity of a correspondent

b) a unique identification of a sender

c) an authentication of an electronic record by typing it uniquely to a key only a sender knows

 

 

d) an encryption signature of a sender

Ans. c

 

83. The responsibility of a certification authority for digital signature is to authenticate the

a) hash function used

b) private keys of subscribers

c) public keys of subscribers

d) key used in DES

Ans. c

84. Certification of Digital signature by an independent authority is need because

a) it is safe

b) it gives confidence to a business

c) the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership

d) private key claimed by a sender may not be actually his

Ans. c

 

85. The secure Electronic Transaction protocol is used for

a) credit card payment

b) cheque payment

c) electronic cash payment

d) payment of small amounts for internet services

Ans. a

 

86. In SET protocol a customer encrypts credit card number using

a) his private key

b) bank‟s public key

c) bank‟s private key

d) merchant‟s public key

Ans. b

 

87. One of the problems with using SET protocol is

a) the merchant‟s risk is high as he accepts encrypted credit card

b) the credit card company should check digital signature

c) the bank has to keep a database of the public keys of all customers

d) the bank has to keep a database of digital signature of all customers

Ans. c

 

88. What happens to your data when it is encrypted?

a) it is transferred to a third party, encoded, then sent back.

b) it is compressed, renamed, and archived.

c) it is sent through a series of supercomputers to be compressed multiple times.

d) it is recorded to retain privacy from third-parties.

Ans. d

 

89. What is a computer virus?

a) A virus is the same as a cookie in that it is stored on your computer against your permission.

b) A virus is friendly software that is simply mislabeled.

c) malicious software that merely stays dormant or your computer.

d) malicious software that inserts itself into other programs.

Ans. d

 

90. How to avoid Man-in-the-middle attacks?

a) Accept every SSL certificate, even the broken ones

b) Use connection without SSL

c) Use HTTPS connections and verify the SSL certificate

d) None of the above

Ans. c

 

91. What happens during the TCP attack, Denial of Service?

a) A virus is sent to disable their dos prompt.

b) Viruses are sent to their ISP to deny them tech support.

c) A worm is loaded onto the victim‟s computer to disable their keyboard.

d) information is repeatedly sent to the victim to consume their system resources, causing them to shut down.

Ans. d

 

92. What is internet protocol security?

a) Methods to secure internet protocol (IP) communication.

b) Ways to disconnect your router in an emergency

c) Methods to secure to disconnected computer.

d) Methods to secure your documents from physical breaches

Ans. a

 

 

93. Which of the following is a valid cyber/internet security requirement?

a) Authentication

b) Integrity

c) Confidentially

d) All of the given option are correct

Ans. d

 

94. Digital signatures provide which of the following?

 a) Authentication

b) Non-repudiation

c) Integrity protection

d) All of the given option are correct

Ans. d

 

95. In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a digital certificate?

a) TCP

b) SHTTP

c) HTTPS

d) XHTTP

Ans. c

 

96. Is true that HTTP is an insecure protocol?

a) True b) False

Ans. a

 

97. What is another name for an insecure plugin?

a) Hardware

b) Software

c) Firmware

d) Malware

Ans. d

 

98. Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user‟s consent?

a) Malware

b) Botnet

c) Trojan horse

d) Spyware

Ans. d

 

99. What is a computer worm?

a) it is software designed to exploit networks.

b) it is software designed to analyze and search for open ports.

c) it is a software utilized to scan packets on open networks.

d) it is malware designed to infect other computers.

Ans. d

 

100. Modern secure password storage should implement:

a) Salted plain-text values of the password.

b) Hashed values of the password

c) Plain-text passwords stored in an encrypted database.

d) Salted and hashed values of the password

 

Ans.d

 

102. Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be download onto the computer?

a) Spyware

b) Virus

c) Trojan Horse

d) Botnets

Ans. c

 

103. Which of the following is the collective name for Trojan horses, spyware, and worms?

a) Spyware

b) Botnets

c) Virus

d) Malware

Ans. d

 

104. Secure cookies have which feature?

a) They are not encrypted, just sent via secure server.

b) They are encrypted.

c) Secure cookies are passed along via encrypted programs.

d) Cookies are always traded between trusted users.

Ans. b

 

105. What is the top method an attacker might infect a target?

a) Social engineering or psychological manipulation.

b) SQL injection.

c) Buffer overflow.

d) Hacking via the internet

Ans. a

 

106. Secure Socket layer is a predecessor of which cryptographic protocol?

a) IPSec

b) Transport Layer security

c) SSL 3.0

d) HTTPS

Ans. b

 

107. An SQL injection is often used to attack what?

a) Small scale machines such as diebold ATMs

b) Large scale sequel databases such as those containing credit card information.

c) Servers running SQL databases similar to Hadoop or Hive.

d) Servers built on NoSQL

Ans. b

 

 

108. What is largely considered the most advanced computer virus?

a) Conficker Virus

b) Zeus

c) Stuxnet.

d) agent.biz

Ans.c

 

 

109. Which of the following is a valid authorization key?

a) Public authorization key

b) Public ephemeral key authorization key

c) Asymmetric authorization keys

d) Symmetric authorization keys

Ans. a

 

110. Which of the following is a valid digital signature key?

a) Public signature authentication key

b) Private signature authentication key

c) Symmetric signature authentication key

d) Private signature key

Ans. d

 

111. Which of the following is not a valid type of firewall?

a) Application- level gateways

b) Circuit level gateways

c) Proxy server gateway

d) Packet filters

Ans. c

 

112. Which of the following HTTP method is considered insecure?

a) POST

b) DELETE

c) TRACE d) GET

Ans. c

 

113. What is the difference between a worm and virus?

a) A worm does not replicate itself like a virus does, but rather moves from computer to computer

b) A virus infects files, while a worm eats them

c) A worm is a virus created for a very specific purpose

d) Unlike a virus, a worm does not need to attach itself to a program to spread.

Ans. d

 

114. What is DHA?

a) Directory Harvest Attack

b) DNS Harvest Attack

c) Direct Harvest Attack

d) Dictionary Harvest Attack

Ans. a

 

115. Which of the following techniques are used by spammers to find valid/existent email addresses?

a) SMTP spoofing

b) SMTP poisioning

c) DNS poisioning

d) Directory Harvest Attack

 

Ans. D

 

 116. Which of the following types of virus lives in the boot sector ?

a) Sector virus

b) Parasitic virus

c) Boot sector virus

d) Bootable virus

Ans. c

 

117. Suppose you got a mail from someone saying that you gave won a Rs. 100000/- and asking you to give him/her Rs. 5000/- to claim your prize. Under Which category does this type of spam mail file?

a) Phishing and Fraud

b) Spoofing mails

c) Hoaxes

d) Chain mails

Ans. a

 

118. What is botnet?

a) A software that runs automatically and authonomously.

b) A software used for antispam

c) A software used to manage MTA

d) A software used to manage MDA

Ans. a

 

119.What are the measures to be Adobt for Best virus Protection?

a) Use of Antivirus.

b) Use of Firewall

c) Keeping software updated

d) All of these

Ans. d

 

120. Which of the following are the ways through which virus spreads?

a) Floppy Disk

b) CD

c) Email Attachment

d) All of the above

Ans. d

121. Which of the following are categorized of spam mails?

a) Phishing and Fraud

b) Spoofing mails

c) Hoaxes

d) All of the above

Ans. d

 

122. Which of the following are preventive antivirus measures?

a) Do not open attachments from suspicious sources.

b) Delete chain and junk mails.

c) Backup your files

d) All of the above

Ans. d

123. Suppose you got a mail from the HDFC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

a) Phishing and fraud

b) Chain mails

c) Hoaxes

d) Brand spoofing

Ans. a

 

124. What is Phishing?

a) Fraudulently acquiring sensitive information

b) An encryption technique

c) An anti-spam technique

d) A password building technique

Ans. a

 

125. Which of the following are direct harms caused by spam?

a) Loss of productivity

b) Increased staff costs

c) Increased infrastructure costs

d) All of the above

Ans.d

 126. Which of the following are Email Security Protocols?

a) S/MIME

b) PEM

c) STE

 

 

d) PME

Ans. a

 

127. Which of the following measures should be taken to tackle spam mails?

a) Blocking and accepting on the basis of MTA IP address

b) Limiting the number of outgoing e-mails per account

c) Authentication mechanisms d) All of the above

Ans. d

 

128. Which of the following are different categories of viruses?

a) Parasitic

b) Bootstrap sector

c) Companion

d) All of the above

Ans. d

 

129. What is the function of the Reverse DNS look up Technique in identifying spam mails?

a) To check the sender‟s email server attempting for spoofing

b) To check the receiver‟s email server attempting for spoofing

c) To check the DNS server validity

d) None of these

Ans. c

 

130. Which of the following are threats to Email Security?

a) Viruses

b) Trojans

c) Spams

d) All of the above

Ans. d

 

131. Which of the following are the disadvantages of verification?

a) More complication?

b) Increased internet traffic

c) Problems in sending valid bulk mails

d) All of the above

Ans. d

 

132. How many antivirus programs should be installed on a single system?

a) 1

b) 2

c) 3

d) 4

Ans. A

 

 133. Which of the following are indirect harms caused by spam?

 a) Malicious payload

 b) Fraud

c) Loss of reputation

d) All of the above

Ans. c

 

134. What does “RBL” stands for in Email Security?

a) Realtime Blacking list

 b) Realtime Blocking list

c) Realtime Blockhole list

 d) Realtime Blackhole list

 Ans. C

 135. Which of the following are different types of spam filtering methods?

a) Blacklisting

 b) Rule based filtering

c) Signature based filtering

d) All of these

 Ans. d

 

136. Which of the following is used in a Directory Harvest Attack?

a) Worms

b) Brute Force

c) Trojans

 d) Viruses

 Ans. B

 137. Which of the following are malicious code attacks?

 a) Brute force

 b) Trojan horses

 c) Viruses

 d) Malware

 Ans. d

138. Which of the following spam filtering techniques has the highest potential for generating false positives?

 a) Community Filtering

 b) Bayesian Filtering

 c) Challenge-Response Filtering

d) Keyword Filtering

Ans. D

 

139. Why shouldn‟t a user click unsubscribe links from spam messages?

a) clicking the link will prevent

 b) unsubscribing makes finding the sender difficult

c) the click may validate the email address

 d) None of these

 Ans. C

 140. What is an example of a phishing scam?

a) An application that looks useful, but actually contains spyware to slow down your comuter

b) An email that appears to be legitimate, but is really being used to obtain personal or important information

c) Hacking into a computer and leaving false trails on who did it

 d) Installing a virus and then asking you to pay to remove it

 Ans. B

 141. Malware is short for

 a) Malicious Software

 b) Malicious System

c) Maliant Software

 d) Maliant Systems

 Ans. A

 

 142. What is a good method for a website owner to confirm a user is not using an account for a spamming purpose?

a) Users must associate a phone to their account and confirm a number sent to them via text

b) Requiring users provide valid personal information during sign up

c) Users that register must click on a confirmation link to the email they specify in their profile

d) All of these

 Ans. D

 

143. A virus is a program that attached itself to (or replace the content of) which of the following file types?

a) Text files

 b) Executables

c) Header files

 d) Source files

 Ans. b

 

144. Which of the following is not a well known anti-virus program?

a) AVAST

b) SMAG

c) AVG

d) McAFee

Ans. b

 

145. What is a captha?

 a) A spam email that attempts to “capture” information to cause damage; the second phase is often referred to as the “gotcha” phase.

b) An SPAM email written in all caps

c) it is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.

d) A group of characters hidden in an email that often includes code used in malware Ans. c 146. What are types of malware? a) Viruses b) Spyware c) Worms d) All of these

 Ans. d

 

147. What could be a good indicator of a spam email?

 a) Something that sounds too good to be true

 b) An email that contain plenty of grammar mistakes

c) An email sent to a bunch of random people

d) All of these

 Ans. d

148. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?

A) The attachment is saved to the disk

b) the attachment is decompressed

c) the attachment opens in a preview editor

 d) the attachment executes

Ans. d

 

149. If you cannot delete malware infected file, what is good method to try first?

 a) Reformat then attempt to delete the file

b) Run windows Repair

 c) Run windows Restore

 d) Boot in Windows safe mode and attempt to delete the file

Ans. D

 

150. Which of these is an example of a possible victim in a phishing attack?

a) The website that was hacked

b) The person who had their identity stolen

c) The bank of the victim

d) All of these

Ans. D

 151. A client asks you to fi x his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?

 a) Reinstall windows

 b) Reformat the computer

 c) Boot from a USB drive and run a program to remove the malware

 d) Use windows restore

Ans. c

 

152. What is rogue security software?

a) Security software that has been compromised to not pick up certain threats

 b) Security software that is no longer being used for the purpose that was intended due to an exploit or hacker.

c) A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed

d) Security software that considers data files or programs as viruses, when they are not.

 Ans. c

 

153. What is a backdoor?

a) A vulnerability in software that allows someone to bypass the normal authentication process

b) It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer

c) it is where viruses store their source code and begin to replicate

 d) it is a way for spyware to leave a system without any trace of it being there.

 Ans. A

 

 154. Virus infection via email attachment can be minimized using which of the following?

a) Opening attachment from external hard drives

 b) Copying attachments to special directories before opening them

 c) Right clicking attachments

d) Deleting mail containing attachments from unknown senders

 Ans. d

155. In order to help prevent spam, a honeypot performs which of the following functions?

a) acts as a desirable mail server in order to lure spammers

b) delivers suspects spam messages more slowly

 c) traps suspected spam messages

d) routes suspected spam to special enclaves in the system

Ans. a

 

156. What is an example of a captcha?

 a) An interactive program which have instructions that read: “Move the triangle into the circle”

 b) 1 + 1 = ?

c) What are the characters in this picture?

 d) All of these

 Ans. D

 

157. What is a Cryptolocker?

 a) A module of the windows Bitlocker encryption system

b) A type of encrypted Linux file system

c) A type of ransomware which encrypts user files and demands payment for the decrypted key.

 d) A malware class which is known for encrypting itself to avoid detection.

 Ans. c

158. Which of the following reduces spam by rejecting mail from a specific IP addresses?

a) URL Blacklisting

b) DNS Blacklisting

c) IMAP Blacklisting

 d) POP3 Blacklisting

 Ans. b

 

159. What is a computer virus?

 a) Software that steals files from your computer and is used by blackmailers

 b) Spyware that slows down a computer by sending statistics to an unknown source

 c) A type of malware that replicates itself and spreads to other files and/ or computers.

 d) A software that hijacks your computer and asks you to pay in order for it to be removed

Ans. c

160. Which of the following is valid difference between a virus and a spyware?

a) Spyware damages data and also steals sensitive private information

b) Virus damaged data, spyware steals sensitive private information

c) Spyware damages data, virus steals sensitive private information

d) Virus damages data and also steals sensitive private information

 Ans. b

 

161. What is called the protection of information and data from unauthorized Access?

 A) Physical security

B Link security

C Risk management

D Information security

 Ans. D

 

 162. Which of the following shows need for cyber security?

 a) Protection from hackers b) Internet scams

c) Viruses

d) All of the above

 Ans. D

 

 163. The first computer virus is_____

 a) Creeper

b) Rat virus

 c) Worm

d) Blaster

Ans. a

164. Trojan horses are very similar to virus in the programs that replicate copies of themselves

 a) True

b) False

Ans. b

 

165. Maintaining computers free from cyber attack is called ______ .

(a) cyber attack

 (b) risk management

(c) online fraud

 (d) phishing Ans. B

 166. When the Indian parliament passed the IT Act?

A) 1990

B) 1992

C) 2000

D) 2005

Ans. C

 167. What is called protecting data from online attacks, deletions, malwares?

 A) Physical security

B) Cyber security

 C) Cyber attack

 D) Virus

 Ans. b

168. Cyber security is also called as _______ security?

 a) Criminal

 b) Information Technology

 c) National

d) International

Ans. B

 

 169. Which of the following is an anti-virus program?

a) Nortron

 b) K7

 c) Quick heal

 d) All of these

Ans. d 170. ______ monitors user activity on internet and transmit that information in the background to someone else.

 a) Malware

b) Spyware

c) Adware

d) None of these

Ans. b

171. Passwords are used to improve the _______ of a network.

 a) Performance

 b) Reliability

 c) Security

d) Longevity

 Ans. c

 

172. Where might a spammer get your personal information from?

 a) Facebook

 b) MySpace

c) Linkedin

 d) All of these

 Ans. d

173. A virus can spread to another computer by

a) Sharing an infected file with another computer

b) Through touch

 c) Pinging other computers from the infected computer

 d) Being on the same network as the computer

 Ans. a

No comments:

Post a Comment