JOIN ADRE 2.0 Telegram Group

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Questions
1 In Electronic cash payment
A a debit card payment system is used
B a customer buys several electronic coins which are digitally signed by coin issuing bank
C a credit card payment system is used
D RSA cryptography is used in the transactions

Answer: a customer buys several electronic coins which are digitally signed by coin issuing bank
2 In NetBill’s protocol for small payments for internet services

(i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account

(ii) The vendor supplies the key to NetBill server when he receives payment

(iii) Checksum of encrypted information received by customer is attached to his payment order

(iv) Vendor does not encrypt information purchased by customer

A i, ii
B i, ii, iii
C i, ii, iii, iv
D i, ii, iv

Answer: i, ii, iii
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 In the NetBill’s protocol for small payments for services available in the internet

(i) the customer is charged only when the information is delivered

(ii) the vendor is guaranteed payment when information is delivered

(iii) the customer must have a certified credit card

(iv) the customer must have a valid public key

A i and ii
B i, ii, iii
C i, ii, iii, iv
D i, ii, iv

Answer: i, ii, iv
4 In cheque payment protocol, the purchase order form is signed by purchaser using
A his public key
B his private key
C his private key using his signature hardware
D various public keys

Answer: his private key using his signature hardware
5 In electronic cheque payments developed, it is assumed that most of the transactions will be
A customers to customers
B customers to business
C business to business
D banks to banks

Answer: business to business
6 The bank has to have the public keys of all customers in SET protocol as it has to
A check the digital signature of customers
B communicate with merchants
C communicate with merchants credit card company
D certify their keys

Answer: check the digital signature of customers
7 One of the problems with using SET protocol is
A the merchant’s risk is high as he accepts encrypted credit card
B the credit card company should check digital signature
C the bank has to keep a database of the public keys of all customers
D the bank has to keep a database of digital signatures of all customers

Answer: the bank has to keep a database of the public keys of all customers
8 In SET protocol a customer sends a purchase order
A encrypted with his public key
B in plain text form
C encrypted using Bank’s public key
D using digital Signature system

Answer: using digital Signature system
9 In SET protocol a customer encrypts credit card number using
A his private key
B bank’s public key
C bank’s private key
D merchant’s public key

Answer: bank’s public key
10 The Secure Electronic Transaction protocol is used for
A credit card payment
B cheque payment
C electronic cash payments
D payment of small amounts for internet services

Answer: credit card payment
11 What does IP mean?
A Instance Principle
B Internet Protocol
C Instant Protocol
D Intellectual Property

Answer: Internet Protocol
12 What happens to your data when it is encrypted?
A It is transferred to a third party, encoded, then sent back.
B It is compressed, renamed, and archived.
C It is sent through a series of supercomputers to be compressed multiple times.
D It is recorded to retain privacy from third-parties.

Answer: It is recorded to retain privacy from third-parties.
13 What is a computer virus?
A A virus is the same as a cookie in that it is stored on your computer against your permission.
B A virus is friendly software that is simply mislabeled.
C Malicious software that merely stays dormant on your computer.
D Malicious software that inserts itself into other programs.

Answer: Malicious software that inserts itself into other programs.
14 Which of the following is valid difference between a Virus and a Spyware ?
A Spyware damages data and also steals sensitive private information
B Virus damages data, Spyware steals sensitive private information
C Spyware damages data, Virus steals sensitive private information
D Virus damages data and also steals sensitive private information

Answer: Virus damages data, Spyware steals sensitive private information
15 How to avoid Man-in-the-middle attacks?
A Accept every SSL certificate, even the broken ones
B Use connections without SSL
C Use HTTPS connections and verify the SSL certificate
D None of the above

Answer: Use HTTPS connections and verify the SSL certificate
16 What happens during the TCP attack; Denial of Service?
A A virus is sent to disable their dos prompt.
B Viruses are sent to their ISP to deny them tech support.
C A worm is loaded onto the victim’s computer to disable their keyboard.
D Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.

Answer: Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.
17 What is Internet Protocol Security?
A Methods to secure Internet Protocol (IP) communication.
B Ways to disconnect your router in an emergency
C Methods to secure a disconnected computer.
D Methods to secure your documents from physical breaches.

Answer: Methods to secure Internet Protocol (IP) communication.
18 Which of the following is a valid Cyber / Internet Security requirement?
A Authentication
B Integrity
C Confidentiality
D All of the given options are correct

Answer: All of the given options are correct
19 Digital signatures provide which of the following ?
A Authentication
B Non-repudiation
C Integrity protection
D All of the given options are correct

Answer: All of the given options are correct
20 In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?
A TCP
B SHTTP
C HTTPS
D XHTTP

Answer: HTTPS

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series