Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
A Malware
B Botnet
C Trojan horse
D Spyware

Answer: Spyware
2 What is a computer worm?
A It is software designed to exploit networks.
B It is software designed to analyze and search for open ports.
C It is a software utilized to scan packets on open networks.
D It is malware designed to infect other computers.

Answer: It is malware designed to infect other computers.
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Is a Unix-based system vulnerable to viruses?
A Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
B Yes, the majority of viruses attack Unix-based systems.
C No. Linux systems are totally impervious to attacks.
D Yes, however the majority are coded to attack Windows-based systems.

Answer: Yes, however the majority are coded to attack Windows-based systems.
4 Which of the following protocol used Port 443 and Port 80 respectively
A HTTPS and HTTP
B XHTML
C HTTP and HTTPS
D DHTML

Answer: HTTPS and HTTP
5 Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
A Backdoor
B Masquerading
C Phishing
D Trojan Horse

Answer: Backdoor
6 What does TCP mean?
A Total Content Positioning
B Transmission Control Protocol
B Transmittable Constant Protocol
B Technical Control Panel

Answer: Transmission Control Protocol
7 What does cross-site scripting allow for attackers?
A Direct introduction of viruses into a victims computer.
B The introduction of worm viruses into the victims website.
C A phishing attack that automatically downloads the victims personal information.
D Injection of client-side scripts into web pages.

Answer: Injection of client-side scripts into web pages.
8 Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
A Botnet
B Spyware
B Trojan horse
B Malware

Answer: Botnet
9 What are TLS and SSL?
A Internet protocols.
B Network layers.
C Internet layers
D Cryptographic protocols.

Answer: Cryptographic protocols.
10 Who was TLS defined by?
A The DEA
B OSHA
C Internet Engineering Task Force
D NSA

Answer: Internet Engineering Task Force
11 Modern secure password storage should implement:
A Salted plain-text values of the password
B Hashed values of the password
C Plain-text passwords stored in an encrypted database
D Salted and hashed values of the password

Answer: Salted and hashed values of the password
12 What is network topology?
A It is the inner networkings of a single computer.
B It is the top layer of a computer network.
C It is the framework of the components of a computer network.
D It is the entirety of the data of a computer network.

Answer: It is the framework of the components of a computer network.
13 Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
A Spware .
B Virus
C Trojan Horse
D Botnets

Answer: Trojan Horse
14 What is another name for Internet Layer?
A TCP layer
B Interwebs
C IP layer
D SSL layer

Answer: IP layer
15 Which of the following is the collective name for Trojan horses, spyware, and worms?
A Spware
B Botnets
C Virus
D Malware

Answer: Malware
16 When cookies are used as session identifiers, how are they then used as a potential security hazard?
A They emulate user's by downloading all the victims information onto a virtual machine.
B User's cookies are altered to a virus-like state.
B They emulate user's by stealing their personal identity.
B Attackers emulate users by stealing their cookies.

Answer: Attackers emulate users by stealing their cookies.
17 Which of the following is a valid flaw of SSL 2.0 ?
A It does not have any protection for the handshake
B Identical cryptographic keys are used for message authentication and encryption
C It has a weak MAC construction that uses the MD5 hash function with a secret prefix
D All of the given options are correct

Answer: All of the given options are correct
18 Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
A X.507
B X.519
C X.508
D X.509

Answer: X.509
19 Trojan Horse programs operate with what intent?
A To slowly but surely infect and become your operating system until the system crashes.
B To openly exploit a systems weaknesses until the user discovers it.
C To masquerade as non-malicious software while exploiting a system's weaknesses.
D To do a series of brute force attacks within the system itself and a series of external attacks from other servers

Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
20 Why is a virtual machine considered a sandboxing method?
A Virtual machines all have firewalls, virus scanners, and proxy connetions.
B Virtual machines all have sandbox features installed on them.
B Virtual machines take the brunt of the attack, so the user is always safe.
B All host resources are channeled through the emulator.

Answer: All host resources are channeled through the emulator.
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series