Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
Which of the following is a class of computer threat Phishing Soliciting DoS attacks Stalking
[A]
Phishing
[B]
Soliciting
[C]
DoS attacks
[D]
Stalking
(2)
When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
[A]
Bullying
[B]
Stalking
[C]
Identity theft
[D]
Phishing
(3)
Which of the following is not an external threat to a computer or a computer network Ignorance Trojan horses Adware Crackers
[A]
Ignorance
[B]
Trojan horses
[C]
Adware
[D]
Crackers
(4)
Unsolicited commercial email is known as ____________. Spam Malware Virus Spyware
[A]
Spam
[B]
Malware
[C]
Virus
[D]
Spyware
(5)
Firewall is a type of ____________. Virus Security threat Worm None of the above
[A]
Virus
[B]
Security threat
[C]
Worm
[D]
None of the above
Answer: None of the above
(6)
Viruses are __________.
[A]
Man made
[B]
Naturally occur
[C]
Machine made
[D]
All of the above
(7)
_____________ monitors user activity on internet and transmit that information in the background to someone else.
[A]
Malware
[B]
Spyware
[C]
Adware
[D]
None of these
(8)
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
(9)
All of the following are examples of real security and privacy threats except
[A]
Hackers
[B]
Virus
[C]
Spam
[D]
Worm
(10)
Which of the following is an anti-virus program
[A]
Norton
[B]
K7
[C]
Quick heal
[D]
All of these
(11)
The certificate Authority signs the digital certificate with
[A]
User's public key
[B]
User's Private Key
[C]
It's own public key
[D]
It's own Private key
Answer: It's own Private key
(12)
Which of the following principle is violated if computer system is not accessible?
[A]
Confidentiality
[B]
Availability
[C]
Access Control
[D]
Authentication
(13)
Which of the following technique is used to verify the integrity of the message?
[A]
Message digest
[B]
Digital signature
[C]
Decryption algorithm
[D]
Protocol
(14)
Which of the following is digital certificate standard?
[A]
X.508
[B]
X.509
[C]
D.509
[D]
None of the Above
(15)
Exploring appropriate and ethical behaviours related to online environments and digital media.
[A]
Cyber ethics
[B]
Cyber security
[C]
Cyber safety
[D]
Cyber law
(16)
Hacking a computer is always illegal and punishable by law.
(17)
It is stealing ideas or creations of others.
[A]
Plagiarism
[B]
Intellectual Property Rights
[C]
Piracy
[D]
All of the above
(18)
It allow a visited website to store its own information about a user on the user’s computer.
[A]
Spam
[B]
Cookies
[C]
Malware
[D]
Adware
(19)
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
[A]
Anti virus
[B]
Cookies
[C]
Firewall
[D]
Cyber safety
(20)
A lincense allows a user to use copyrighted material.
Please share this page