JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Questions
1 Which of the following is a class of computer threat Phishing Soliciting DoS attacks Stalking
A Phishing
B Soliciting
C DoS attacks
D Stalking

Answer: DoS attacks
2 When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
A Bullying
B Stalking
C Identity theft
D Phishing

Answer: Stalking
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following is not an external threat to a computer or a computer network Ignorance Trojan horses Adware Crackers
A Ignorance
B Trojan horses
C Adware
D Crackers

Answer: Ignorance
4 Unsolicited commercial email is known as ____________. Spam Malware Virus Spyware
A Spam
B Malware
C Virus
D Spyware

Answer: Spam
5 Firewall is a type of ____________. Virus Security threat Worm None of the above
A Virus
B Security threat
C Worm
D None of the above

Answer: None of the above
6 Viruses are __________.
A Man made
B Naturally occur
C Machine made
D All of the above

Answer: Man made
7 _____________ monitors user activity on internet and transmit that information in the background to someone else.
A Malware
B Spyware
C Adware
D None of these

Answer: Spyware
8 Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
A True
B False

Answer: False
9 All of the following are examples of real security and privacy threats except
A Hackers
B Virus
C Spam
D Worm

Answer: Spam
10 Which of the following is an anti-virus program
A Norton
B K7
C Quick heal
D All of these

Answer: All of these
11 The certificate Authority signs the digital certificate with
A User's public key
B User's Private Key
C It's own public key
D It's own Private key

Answer: It's own Private key
12 Which of the following principle is violated if computer system is not accessible?
A Confidentiality
B Availability
C Access Control
D Authentication

Answer: Availability
13 Which of the following technique is used to verify the integrity of the message?
A Message digest
B Digital signature
C Decryption algorithm
D Protocol

Answer: Message digest
14 Which of the following is digital certificate standard?
A X.508
B X.509
C D.509
D None of the Above

Answer: X.509
15 Exploring appropriate and ethical behaviours related to online environments and digital media.
A Cyber ethics
B Cyber security
C Cyber safety
D Cyber law

Answer: Cyber ethics
16 Hacking a computer is always illegal and punishable by law.
A True
B False

Answer: True
17 It is stealing ideas or creations of others.
A Plagiarism
B Intellectual Property Rights
C Piracy
D All of the above

Answer: All of the above
18 It allow a visited website to store its own information about a user on the user’s computer.
A Spam
B Cookies
C Malware
D Adware

Answer: Cookies
19 It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
A Anti virus
B Cookies
C Firewall
D Cyber safety

Answer: Firewall
20 A lincense allows a user to use copyrighted material.
A True
B False

Answer: True

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series