1. Which type of virus attaches with EXE files and the resulting infected EXE file attacks other EXE files and infects them ?
- Parasitic virus
- Boot Sector Virus
- Stealth Virus
- Memory Resident Virus
Answer: Parasitic virus
2. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
- Cyber attack
- Computer security
- Cryptography
- Digital hacking
Answer: Cyber attack
Advertisement
3. Which of the following is an objective of network security?
- Confidentiality
- Integrity
- Availability
- All of the above
Answer: All of the above
4. Which of the following is a type of cyber attack?
- Phishing
- SQL Injections
- Password Attack
- All of the above
Answer: All of the above
5. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
- 1991
- 1983
- 1970
- 1964
Answer: 1970
6. Which of the following actions compromise cyber security?
- Vulnerability
- Attack
- Threat
- Exploit
Answer: Threat
7. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
- Clickjacking
- Buffer-overflow
- Phishing
- MiTM
Answer: Buffer-overflow
8. Which one of the following can be considered as the class of computer threats?
- Dos Attack
- Phishing
- Soliciting
- Both 1 and 3
Answer: Dos Attack
9. Which one of the following is a type of antivirus program?
- Quick heal
- Mcafee
- Kaspersky
- All of the above
Answer: All of the above
10. Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
- Piracy
- Plagiarism
- Intellectual property rights
- All of the above
Answer: All of the above
11. Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
- Cyber low
- Cyberethics
- Cybersecurity
- Cybersafety
Answer: Cyberethics
12. Which one of the following usually used in the process of Wi-Fi-hacking?
- Aircrack-ng
- Wireshark
- Norton
- All of the above
Answer: Aircrack-ng
13. Which of the following is not a type of scanning?
- Xmas Tree Scan
- Cloud scan
- Null Scan
- SYN Stealth
Answer: Cloud scan
14. Which of the following are the types of scanning?
- Network, vulnerability, and port scanning
- Port, network, and services
- Client, Server, and network
- None of the above
Answer: Network, vulnerability, and port scanning
15. To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
- Antivirus
- Firewall
- Vlc player
- Script
Answer: Firewall
16. What is Cyber Security?
- Cyber Security provides security against malware
- Cyber Security provides security against cyber-terrorists
- Cyber Security protects a system from cyber attacks
- All of the mentioned
Answer: All of the mentioned
17. Which of the following is a type of cyber security?
- Cloud Security
- Network Security
- Application Security
- All of the above
Answer: All of the above
18. Which of the following is not a cybercrime?
- Denial of Service
- Man in the Middle
- Malware
- AES
Answer: AES
19. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
- Nation / State sponsored hackers
- CIA triad
- Special Hackers
- Government Hackers
Answer: Nation / State sponsored hackers
20. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
- Pharming
- Website-Duplication
- Mimicking
- Spamming
Answer: Pharming
21. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
- Malware
- Spyware
- Adware
- All of the above
Answer: Spyware
22. Which of the following refers to the violation of the principle if a computer is no more accessible?
- Access control
- Confidentiality
- Availability
- All of the above
Answer: Availability
23. In system hacking, which of the following is the most crucial activity?
- Information gathering
- Covering tracks
- Cracking passwords
- None of the above
Answer: Cracking passwords
24. Which of the following act violates cyber security?
- Exploit
- Attack
- Threat
- Vulnerability
Answer: Attack
25. Which of the following is a component of cyber security?
- Internet Of Things
- AI
- Database
- Attacks
Answer: Internet Of Things
26. Who is the father of computer security?
- August Kerckhoffs
- Bob Thomas
- Robert
- Charles
Answer: August Kerckhoffs
27. Keyloggers are a form of _____.
- Social Engineering
- Trojan
- Shoulder Surfing
- Spyware
Answer: Spyware
28. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- Malware
- Adware
- Antivirus
- Both B and C
Answer: Antivirus
29. Which one of the following refers to the technique used for verifying the integrity of the message?
- Digital signature
- Decryption algorithm
- Protocol
- Message Digest
Answer: Message Digest
30. Symmetric Key Cryptography uses stream cipher to encrypt the information. One of example of stream cipher:
- SHA
- RC4
- MD5
- Blowfish
Answer: RC4
31. What are the features of cyber security?
- Compliance
- Defense against internal threats
- Threat Prevention
- All of the above
Answer: All of the above
32. Which of the following is not an advantage of cyber security?
- Makes the system slower
- Minimizes computer freezing and crashes
- Gives privacy to users
- Protects system against viruses
Answer: Makes the system slower
33. Which of the following is not a type of peer-to-peer cyber-crime?
- MiTM
- Injecting Trojans to a target victim
- Credit card details leak in the deep web
- Phishing
Answer: Credit card details leak in the deep web
34. Which of the following is considered as the unsolicited commercial email?
- Virus
- Malware
- Spam
- All of the above
Answer: Spam
35. Which of the following port and IP address scanner famous among the users?
- Cain and Abel
- Angry IP Scanner
- Snort
- Ettercap
Answer: Angry IP Scanner
36. What does cyber security protect?
- Cyber security protects criminals
- Cyber security protects internet-connected systems
- Cyber security protects hackers
- None of the mentioned
Answer: Cyber security protects internet-connected systems
37. Digital signature cannot provide _______ for the message
- Authentication
- Nonrepudiation
- Confidentiality
- Integrity
Answer:Confidentiality
38. “Cyberspace” was coined by _________
- Richard Stallman
- William Gibson
- Andrew Tannenbaum
- Scott Fahlman
Answer: William Gibson
39. Which of the following is/are the virus attacks?
- Citrix breach.
- WannaCry.
- NotPetya.
- More than one of the above
Answer: More than one of the above
40. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
- Antivirus
- Firewall
- Cookies
- Malware
Answer: Firewall
Random GK Questions