Cyber Security Questions and Answers | Cyber Security MCQs and Answers

(1) In Electronic cash payment
[A] a debit card payment system is used
[B] a customer buys several electronic coins which are digitally signed by coin issuing bank
[C] a credit card payment system is used
[D] RSA cryptography is used in the transactions
Answer: a customer buys several electronic coins which are digitally signed by coin issuing bank
(2) In NetBill’s protocol for small payments for internet services

(i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account

(ii) The vendor supplies the key to NetBill server when he receives payment

(iii) Checksum of encrypted information received by customer is attached to his payment order

(iv) Vendor does not encrypt information purchased by customer

[A] i, ii
[B] i, ii, iii
[C] i, ii, iii, iv
[D] i, ii, iv
Answer: i, ii, iii

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

Article and Schedule Quiz Start Test!
(3) In the NetBill’s protocol for small payments for services available in the internet

(i) the customer is charged only when the information is delivered

(ii) the vendor is guaranteed payment when information is delivered

(iii) the customer must have a certified credit card

(iv) the customer must have a valid public key

[A] i and ii
[B] i, ii, iii
[C] i, ii, iii, iv
[D] i, ii, iv
Answer: i, ii, iv
(4) In cheque payment protocol, the purchase order form is signed by purchaser using
[A] his public key
[B] his private key
[C] his private key using his signature hardware
[D] various public keys
Answer: his private key using his signature hardware
(5) In electronic cheque payments developed, it is assumed that most of the transactions will be
[A] customers to customers
[B] customers to business
[C] business to business
[D] banks to banks
Answer: business to business
(6) The bank has to have the public keys of all customers in SET protocol as it has to
[A] check the digital signature of customers
[B] communicate with merchants
[C] communicate with merchants credit card company
[D] certify their keys
Answer: check the digital signature of customers
(7) One of the problems with using SET protocol is
[A] the merchant’s risk is high as he accepts encrypted credit card
[B] the credit card company should check digital signature
[C] the bank has to keep a database of the public keys of all customers
[D] the bank has to keep a database of digital signatures of all customers
Answer: the bank has to keep a database of the public keys of all customers
(8) In SET protocol a customer sends a purchase order
[A] encrypted with his public key
[B] in plain text form
[C] encrypted using Bank’s public key
[D] using digital Signature system
Answer: using digital Signature system
(9) In SET protocol a customer encrypts credit card number using
[A] his private key
[B] bank’s public key
[C] bank’s private key
[D] merchant’s public key
Answer: bank’s public key
(10) The Secure Electronic Transaction protocol is used for
[A] credit card payment
[B] cheque payment
[C] electronic cash payments
[D] payment of small amounts for internet services
Answer: credit card payment
(11) What does IP mean?
[A] Instance Principle
[B] Internet Protocol
[C] Instant Protocol
[D] Intellectual Property
Answer: Internet Protocol
(12) What happens to your data when it is encrypted?
[A] It is transferred to a third party, encoded, then sent back.
[B] It is compressed, renamed, and archived.
[C] It is sent through a series of supercomputers to be compressed multiple times.
[D] It is recorded to retain privacy from third-parties.
Answer: It is recorded to retain privacy from third-parties.
(13) What is a computer virus?
[A] A virus is the same as a cookie in that it is stored on your computer against your permission.
[B] A virus is friendly software that is simply mislabeled.
[C] Malicious software that merely stays dormant on your computer.
[D] Malicious software that inserts itself into other programs.
Answer: Malicious software that inserts itself into other programs.
(14) Which of the following is valid difference between a Virus and a Spyware ?
[A] Spyware damages data and also steals sensitive private information
[B] Virus damages data, Spyware steals sensitive private information
[C] Spyware damages data, Virus steals sensitive private information
[D] Virus damages data and also steals sensitive private information
Answer: Virus damages data, Spyware steals sensitive private information
(15) How to avoid Man-in-the-middle attacks?
[A] Accept every SSL certificate, even the broken ones
[B] Use connections without SSL
[C] Use HTTPS connections and verify the SSL certificate
[D] None of the above
Answer: Use HTTPS connections and verify the SSL certificate
(16) What happens during the TCP attack; Denial of Service?
[A] A virus is sent to disable their dos prompt.
[B] Viruses are sent to their ISP to deny them tech support.
[C] A worm is loaded onto the victim’s computer to disable their keyboard.
[D] Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
Answer: Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
(17) What is Internet Protocol Security?
[A] Methods to secure Internet Protocol (IP) communication.
[B] Ways to disconnect your router in an emergency
[C] Methods to secure a disconnected computer.
[D] Methods to secure your documents from physical breaches.
Answer: Methods to secure Internet Protocol (IP) communication.
(18) Which of the following is a valid Cyber / Internet Security requirement?
[A] Authentication
[B] Integrity
[C] Confidentiality
[D] All of the given options are correct
Answer: All of the given options are correct
(19) Digital signatures provide which of the following ?
[A] Authentication
[B] Non-repudiation
[C] Integrity protection
[D] All of the given options are correct
Answer: All of the given options are correct
(20) In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
[A] TCP
[B] SHTTP
[C] HTTPS
[D] XHTTP
Answer: HTTPS

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!