JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Questions
1 Which of the following is a class of computer threat Phishing Soliciting DoS attacks Stalking
A Phishing
B Soliciting
C DoS attacks
D Stalking

Answer: DoS attacks
2 When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
A Bullying
B Stalking
C Identity theft
D Phishing

Answer: Stalking
Advertisement
ADRE 2.0 Mock Test - 5 Start Test
ADRE 2.0 Mock Test - 5 Start Test

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following is not an external threat to a computer or a computer network Ignorance Trojan horses Adware Crackers
A Ignorance
B Trojan horses
C Adware
D Crackers

Answer: Ignorance
4 Unsolicited commercial email is known as ____________. Spam Malware Virus Spyware
A Spam
B Malware
C Virus
D Spyware

Answer: Spam
5 Firewall is a type of ____________. Virus Security threat Worm None of the above
A Virus
B Security threat
C Worm
D None of the above

Answer: None of the above
6 Viruses are __________.
A Man made
B Naturally occur
C Machine made
D All of the above

Answer: Man made
7 _____________ monitors user activity on internet and transmit that information in the background to someone else.
A Malware
B Spyware
C Adware
D None of these

Answer: Spyware
8 Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
A True
B False

Answer: False
9 All of the following are examples of real security and privacy threats except
A Hackers
B Virus
C Spam
D Worm

Answer: Spam
10 Which of the following is an anti-virus program
A Norton
B K7
C Quick heal
D All of these

Answer: All of these
11 The certificate Authority signs the digital certificate with
A User's public key
B User's Private Key
C It's own public key
D It's own Private key

Answer: It's own Private key
12 Which of the following principle is violated if computer system is not accessible?
A Confidentiality
B Availability
C Access Control
D Authentication

Answer: Availability
13 Which of the following technique is used to verify the integrity of the message?
A Message digest
B Digital signature
C Decryption algorithm
D Protocol

Answer: Message digest
14 Which of the following is digital certificate standard?
A X.508
B X.509
C D.509
D None of the Above

Answer: X.509
15 Exploring appropriate and ethical behaviours related to online environments and digital media.
A Cyber ethics
B Cyber security
C Cyber safety
D Cyber law

Answer: Cyber ethics
16 Hacking a computer is always illegal and punishable by law.
A True
B False

Answer: True
17 It is stealing ideas or creations of others.
A Plagiarism
B Intellectual Property Rights
C Piracy
D All of the above

Answer: All of the above
18 It allow a visited website to store its own information about a user on the user’s computer.
A Spam
B Cookies
C Malware
D Adware

Answer: Cookies
19 It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
A Anti virus
B Cookies
C Firewall
D Cyber safety

Answer: Firewall
20 A lincense allows a user to use copyrighted material.
A True
B False

Answer: True

ADRE 2.0 MOCK TEST

Take Mock Tests

Government Schemes Mock Test Start Test!
Political Science Mock Test – 42 Start Test
History Test – 190 Start Test
Quantitative Aptitude Test Start Test!
Trigonometry - Mock Test Start Test!
Data Interpretation - Mock Test Start Test!
General Awareness - Mock Test Start Test!
Reasoning Ability - Mock Test Start Test!
Englist(Antonyms) Mock Test 1 Start Test!
Quantitative Aptitude (Percentage) Mock Test Start Test!
Economy Mock Test 1 Unlock Test!
Books & Authors - Test 2 Unlock Test!
Advertisement