Cyber Security Multiple Choice Questions and Answers | Computers & IT MCQs

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

1. Which type of virus attaches with EXE files and the resulting infected EXE file attacks other EXE files and infects them ?
  1. Parasitic virus
  2. Boot Sector Virus
  3. Stealth Virus
  4. Memory Resident Virus

Answer: Parasitic virus

2. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
  1. Cyber attack
  2. Computer security
  3. Cryptography
  4. Digital hacking

Answer: Cyber attack

Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3. Which of the following is an objective of network security?
  1. Confidentiality
  2. Integrity
  3. Availability
  4. All of the above

Answer: All of the above

4. Which of the following is a type of cyber attack?
  1. Phishing
  2. SQL Injections
  3. Password Attack
  4. All of the above

Answer: All of the above

5. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
  1. 1991
  2. 1983
  3. 1970
  4. 1964

Answer: 1970

6. Which of the following actions compromise cyber security?
  1. Vulnerability
  2. Attack
  3. Threat
  4. Exploit

Answer: Threat

7. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
  1. Clickjacking
  2. Buffer-overflow
  3. Phishing
  4. MiTM

Answer: Buffer-overflow

8. Which one of the following can be considered as the class of computer threats?
  1. Dos Attack
  2. Phishing
  3. Soliciting
  4. Both 1 and 3

Answer: Dos Attack

9. Which one of the following is a type of antivirus program?
  1. Quick heal
  2. Mcafee
  3. Kaspersky
  4. All of the above

Answer: All of the above

10. Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
  1. Piracy
  2. Plagiarism
  3. Intellectual property rights
  4. All of the above

Answer: All of the above

11. Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
  1. Cyber low
  2. Cyberethics
  3. Cybersecurity
  4. Cybersafety

Answer: Cyberethics

12. Which one of the following usually used in the process of Wi-Fi-hacking?
  1. Aircrack-ng
  2. Wireshark
  3. Norton
  4. All of the above

Answer: Aircrack-ng

13. Which of the following is not a type of scanning?
  1. Xmas Tree Scan
  2. Cloud scan
  3. Null Scan
  4. SYN Stealth

Answer: Cloud scan

14. Which of the following are the types of scanning?
  1. Network, vulnerability, and port scanning
  2. Port, network, and services
  3. Client, Server, and network
  4. None of the above

Answer: Network, vulnerability, and port scanning

15. To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
  1. Antivirus
  2. Firewall
  3. Vlc player
  4. Script

Answer: Firewall

16. What is Cyber Security?
  1. Cyber Security provides security against malware
  2. Cyber Security provides security against cyber-terrorists
  3. Cyber Security protects a system from cyber attacks
  4. All of the mentioned

Answer: All of the mentioned

17. Which of the following is a type of cyber security?
  1. Cloud Security
  2. Network Security
  3. Application Security
  4. All of the above

Answer: All of the above

18. Which of the following is not a cybercrime?
  1. Denial of Service
  2. Man in the Middle
  3. Malware
  4. AES

Answer: AES

19. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
  1. Nation / State sponsored hackers
  2. CIA triad
  3. Special Hackers
  4. Government Hackers

Answer: Nation / State sponsored hackers

20. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
  1. Pharming
  2. Website-Duplication
  3. Mimicking
  4. Spamming

Answer: Pharming

21. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
  1. Malware
  2. Spyware
  3. Adware
  4. All of the above

Answer: Spyware

22. Which of the following refers to the violation of the principle if a computer is no more accessible?
  1. Access control
  2. Confidentiality
  3. Availability
  4. All of the above

Answer: Availability

23. In system hacking, which of the following is the most crucial activity?
  1. Information gathering
  2. Covering tracks
  3. Cracking passwords
  4. None of the above

Answer: Cracking passwords

24. Which of the following act violates cyber security?
  1. Exploit
  2. Attack
  3. Threat
  4. Vulnerability

Answer: Attack

25. Which of the following is a component of cyber security?
  1. Internet Of Things
  2. AI
  3. Database
  4. Attacks

Answer: Internet Of Things

26. Who is the father of computer security?
  1. August Kerckhoffs
  2. Bob Thomas
  3. Robert
  4. Charles

Answer: August Kerckhoffs

27. Keyloggers are a form of _____.
  1. Social Engineering
  2. Trojan
  3. Shoulder Surfing
  4. Spyware

Answer: Spyware

28. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
  1. Malware
  2. Adware
  3. Antivirus
  4. Both B and C

Answer: Antivirus

29. Which one of the following refers to the technique used for verifying the integrity of the message?
  1. Digital signature
  2. Decryption algorithm
  3. Protocol
  4. Message Digest

Answer: Message Digest

30. Symmetric Key Cryptography uses stream cipher to encrypt the information. One of example of stream cipher:
  1. SHA
  2. RC4
  3. MD5
  4. Blowfish

Answer: RC4

31. What are the features of cyber security?
  1. Compliance
  2. Defense against internal threats
  3. Threat Prevention
  4. All of the above

Answer: All of the above

32. Which of the following is not an advantage of cyber security?
  1. Makes the system slower
  2. Minimizes computer freezing and crashes
  3. Gives privacy to users
  4. Protects system against viruses

Answer: Makes the system slower

33. Which of the following is not a type of peer-to-peer cyber-crime?
  1. MiTM
  2. Injecting Trojans to a target victim
  3. Credit card details leak in the deep web
  4. Phishing

Answer: Credit card details leak in the deep web

34. Which of the following is considered as the unsolicited commercial email?
  1. Virus
  2. Malware
  3. Spam
  4. All of the above

Answer: Spam

35. Which of the following port and IP address scanner famous among the users?
  1. Cain and Abel
  2. Angry IP Scanner
  3. Snort
  4. Ettercap

Answer: Angry IP Scanner

36. What does cyber security protect?
  1. Cyber security protects criminals
  2. Cyber security protects internet-connected systems
  3. Cyber security protects hackers
  4. None of the mentioned

Answer: Cyber security protects internet-connected systems

37. Digital signature cannot provide _______ for the message
  1. Authentication
  2. Nonrepudiation
  3. Confidentiality
  4. Integrity

Answer:Confidentiality

38. “Cyberspace” was coined by _________
  1. Richard Stallman
  2. William Gibson
  3. Andrew Tannenbaum
  4. Scott Fahlman

Answer: William Gibson

39. Which of the following is/are the virus attacks?
  1. Citrix breach.
  2. WannaCry.
  3. NotPetya.
  4. More than one of the above

Answer: More than one of the above

40. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
  1. Antivirus
  2. Firewall
  3. Cookies
  4. Malware

Answer: Firewall

Random GK Questions

Assam Direct Recruitment Test Series