GkSeries.com

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

(1) Which of the following is a class of computer threat Phishing Soliciting DoS attacks Stalking
[A] Phishing
[B] Soliciting
[C] DoS attacks
[D] Stalking
Answer: DoS attacks
(2) When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
[A] Bullying
[B] Stalking
[C] Identity theft
[D] Phishing
Answer: Stalking

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Which of the following is not an external threat to a computer or a computer network Ignorance Trojan horses Adware Crackers
[A] Ignorance
[B] Trojan horses
[C] Adware
[D] Crackers
Answer: Ignorance
(4) Unsolicited commercial email is known as ____________. Spam Malware Virus Spyware
[A] Spam
[B] Malware
[C] Virus
[D] Spyware
Answer: Spam
(5) Firewall is a type of ____________. Virus Security threat Worm None of the above
[A] Virus
[B] Security threat
[C] Worm
[D] None of the above
Answer: None of the above
(6) Viruses are __________.
[A] Man made
[B] Naturally occur
[C] Machine made
[D] All of the above
Answer: Man made
(7) _____________ monitors user activity on internet and transmit that information in the background to someone else.
[A] Malware
[B] Spyware
[C] Adware
[D] None of these
Answer: Spyware
(8) Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
[A] True
[B] False
Answer: False
(9) All of the following are examples of real security and privacy threats except
[A] Hackers
[B] Virus
[C] Spam
[D] Worm
Answer: Spam
(10) Which of the following is an anti-virus program
[A] Norton
[B] K7
[C] Quick heal
[D] All of these
Answer: All of these
(11) The certificate Authority signs the digital certificate with
[A] User's public key
[B] User's Private Key
[C] It's own public key
[D] It's own Private key
Answer: It's own Private key
(12) Which of the following principle is violated if computer system is not accessible?
[A] Confidentiality
[B] Availability
[C] Access Control
[D] Authentication
Answer: Availability
(13) Which of the following technique is used to verify the integrity of the message?
[A] Message digest
[B] Digital signature
[C] Decryption algorithm
[D] Protocol
Answer: Message digest
(14) Which of the following is digital certificate standard?
[A] X.508
[B] X.509
[C] D.509
[D] None of the Above
Answer: X.509
(15) Exploring appropriate and ethical behaviours related to online environments and digital media.
[A] Cyber ethics
[B] Cyber security
[C] Cyber safety
[D] Cyber law
Answer: Cyber ethics
(16) Hacking a computer is always illegal and punishable by law.
[A] True
[B] False
Answer: True
(17) It is stealing ideas or creations of others.
[A] Plagiarism
[B] Intellectual Property Rights
[C] Piracy
[D] All of the above
Answer: All of the above
(18) It allow a visited website to store its own information about a user on the user’s computer.
[A] Spam
[B] Cookies
[C] Malware
[D] Adware
Answer: Cookies
(19) It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
[A] Anti virus
[B] Cookies
[C] Firewall
[D] Cyber safety
Answer: Firewall
(20) A lincense allows a user to use copyrighted material.
[A] True
[B] False
Answer: True

Please share this page

Click Here to Read more questions

Teacher Eligibility Test