Header Ads Widget

BCA Information

Cyber security MCQ

 

What is Cyber Security?

a) Cyber Security provides security against malware
 
b) Cyber Security provides security against cyber-terrorists
 
c) Cyber Security protects a system from cyber attacks
 
d) All of the mentioned
 

2. What does cyber security protect?

a) Cyber security protects criminals

 b) Cyber security protects internet-connected systems

c) Cyber security protects hackers

d) None of the mentioned

 

3. Who is the father of computer security?

 

a) August Kerckhoffs

b) Bob Thomas

 c) Robert

 d) Charles

 

4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

 a) Cyber attack

 b) Computer security

 c) Cryptography

 d) Digital hacking

 

5. Which of the following is a type of cyber security?

 a) Cloud Security

 b) Network Security

 c) Application Security

 d) All of the above

 

6. What are the features of cyber security?

 a) Compliance

 b) Defense against internal threats

 c) Threat Prevention

 d) All of the above

 

7. Which of the following is an objective of network security?

 a) Confidentiality

 b) Integrity

 c) Availability

 d) All of the above


8. Which of the following is not a cybercrime?

a) Denial of Service

 b) Man in the Middle

c) Malware

 d) AES

 

9. Which of the following is a component of cyber security?

 a) Internet Of Things

 b) AI

 c) Database

 d) Attacks

 

10. Which of the following is a type of cyber attack?

 a) Phishing

 b) SQL Injections

 c) Password Attack

 d) All of the above

 

11. Which of the following is not an advantage of cyber security?

 a) Makes the system slower

 b) Minimizes computer freezing and crashes

 c) Gives privacy to users

 d) Protects system against viruses


12. “Cyberspace” was coined by _________

 a) Richard Stallman

 b) William Gibson

 c) Andrew Tannenbaum

 d) Scott Fahlman

 

13. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?

 a) 1991

 b) 1983

 c) 1970

 d) 1964

  

14. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

 a) Nation / State sponsored hackers

 b) CIA triad

 c) Special Hackers

 d) Government Hackers

 

15. Which of the following act violates cyber security?

 a) Exploit

 b) Attack

 c) Threat

 d) Vulnerability

 

16. Which of the following actions compromise cyber security?

 a) Vulnerability

 b) Attack

 c) Threat

 d) Exploit

 

17. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

 a) Pharming

 b) Website-Duplication

 c) Mimicking

 d) Spamming

 

18. Which of the following is not a type of peer-to-peer cyber-crime?

 a) MiTM

 b) Injecting Trojans to a target victim

 c) Credit card details leak in the deep web

 d) Phishing

 


19. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

 a) Clickjacking

 b) Buffer-overflow

 c) Phishing

 d) MiTM


20. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

 a) ip tracker

 b) emails

 c) websites

 d) web pages


21. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?

 a) Digital crime

 b) Threats

 c) System hijacking

 d) Cyber Attack

 

22. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?

 a) White Hat Hackers

 b) Black Hat Hackers

 c) Hactivists

 d) Gray Hat Hackers

 

 23. IT security in any firm or organization is maintained and handled by ____________________

 a) Software Security Specialist

 b) CEO of the organization

 c) Security Auditor

 d) IT Security Engineer


24. Where did the term “hacker” originate?

 a) MIT

 b) New York University

 c) Harvard University

 d) Bell’s Lab


25. What is the existence of weakness in a system or network is known as?

 a) Attack

 b) Exploit

 c) Vulnerability

 d) Threat

 

26. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

 a) MiTM attack

 b) Phishing attack

 c) Website attack

 d) DoS attack

 

27. Which of the following is not a step followed by cyber-criminals in data breaching?

 a) Exfiltration

 b) Research and info-gathering

 c) Attack the system

 d) Fixing the bugs


28. Which of the following online service’s privacy cannot be protected using Tor?

 a) Browsing data

 b) Instant messaging

 c) Login using ID

 d) Relay chats

 

29. Which of the following term refers to a group of hackers who are both white and black hat?

 a) Yellow Hat hackers

 b) Grey Hat hackers

 c) Red Hat Hackers

 d) White-Black Hat Hackers

 

30. Which of the following is not an email-related hacking tool?

 a) Mail Password

 b) Email Finder Pro

 c) Mail PassView

 d) Sendinc

 

30. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?

 a) botnets

 b) programs

 c) virus

 d) worms


31. Which of the following is the least strong security encryption standard?

 a) WPA3

 b) WPA2

 c) WPA

 d) WEP


32. Which of the following is a Stuxnet?

 a) Trojan

 b) Antivirus

 c) Worm

 d) Virus

 

33. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?

a) Operating System fingerprinting

 b) Operating System penetration testing

 c) Digital-printing

 d) Machine printing

 

34. Which of the following can diminish the chance of data leakage?

 a) Steganography

 b) Chorography

 c) Cryptography

 d) Authentication


35. The full form of Malware is ________

 a) Malfunctioned Software

 b) Multipurpose Software

 c) Malicious Software

 d) Malfunctioning of Security

 

 

36. Who deploy Malwares to a system or network?

 a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists

 b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists

 c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists

d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers


37. _____________ is a code injecting method used for attacking the database of a system / website.

 a) HTML injection

 b) SQL Injection

 c) Malicious code injection

 d) XML Injection


38. XSS is abbreviated as __________

 a) Extreme Secure Scripting

 b) Cross Site Security

 c) X Site Scripting

 d) Cross Site Scripting

 

39. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

 

a) SQL injection

 b) HTML Injection

 c) Cross Site Scripting (XSS)

 d) Cross Site Request Forgery (XSRF)

 

40. When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

 a) Database crash attack

 b) DoS (Denial of Service) attack

 c) Data overflow Attack

 d) Buffer Overflow attack

 

41. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

 a) Session Hijacking

 b) Session Fixation

 c) Cookie stuffing

 d) Session Spying


42. Which of this is an example of physical hacking?

 a) Remote Unauthorised access

 b) Inserting malware loaded USB to a system

 c) SQL Injection on SQL vulnerable site

 d) DDoS (Distributed Denial of Service) attack

 

43. Which of them is not a wireless attack?

 a) Eavesdropping

 b) MAC Spoofing

 c) Wireless Hijacking

d) Phishing


44. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

 a) Cyber-crime

 b) Cyber Attack

 c) System hijacking

 d) Digital crime

 

45. Which method of hacking will record all your keystrokes?

 a) Keyhijacking

 b) Keyjacking

 c) Keylogging

 d) Keyboard monitoring


46. _________ are the special type of programs used for recording and tracking user’s keystroke.

 

a) Keylogger

 b) Trojans

 c) Virus

 d) Worms

 

47. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

a) Malware

 b) Remote Access Trojans

 c) Keyloggers

 d) Spyware

 

48. Stuxnet is a _________

a) Worm

 b) Virus

 c) Trojan

 d) Antivirus

 

49. ___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

 a) Cyber-warfare

 b) Cyber campaign

 c) Cyber-terrorism

 d) Cyber attack

 


 

 

 

Post a Comment

0 Comments

Popular Posts

Visual Basic 6.0 Program
Node js practical