HIDE
FALSE

Search This Blog

Cyber security MCQ Questions and answers PDF

Cyber security MCQ questions and answers with PDF download free for interview and competitive exams preparation. Cyber Security MCQ Question...

Cyber security MCQ questions and answers with PDF download free for interview and competitive exams preparation.

Cyber Security MCQ Questions and answers

1. What is the full form of LDAP?

A Light Weight Directory Access Provider

B Light Weight Directory Access Protocol

C Light Weight Directory Access Program

D Light Weight Directory Access Protection

Ans. b

 

2. What is called the collective terms of malicious software, such as viruses, worms and trojans?

A Spam          

B Phishing    

C Malware     

D Harm

Ans. c


3. What is the full form of CIA under information security?

A Confidentiality Integrity Availability      

B Criminal Investigation Agency

C Cost Information Agency                        

D Credit Integrity Assement

Ans. a

 

4. What is called periodic assessment of security vulnerability in computer system?

A Threat         

B Attack         

C Hacking     

D Security audit

Ans. d

 

5. What is called a single point of access for several networking services?

A Phishing    

B Web service          

C Directory service              

D Worms

Ans. c

 

6. Which activities endanger the sovereignty and integrity of nation?

A Cyber Terrorism    

B Cyber vandalism              

C Cyber squatting    

D Carding

Ans. a

 

7. Which crime involves the use of computer networks to create, distribute or access materials tha sexually expoit underage persons?

A Assault by Threat             

B Cyber squatting    

C Cyber vandalism              

D Child pornography

Ans. d

 

8. Which method go through all the files or network elements with an intention to detect something unusual?

A Probing      

B Phishing    

C Infecting    

D Scanning

Ans. d

 

9. Victims of cyber attack might loose _______.

(a) data           

(b) money      

(c) both a & b            

(d) none of them

Ans. c

 

10. Under information security, any device having _______is classified as a computing device.

(a) processor             

(b) memory                

(c) both a & b            

(d) neither a nor b

Ans. c

 

11. Under information security, CIA standsfor _______.

(a) Criminal Investigation Agency                       

(b) Confidentiality, Integrity, Availability

(c) Cost Information Agency                     

(d) Credit Integrity Assessment

Ans. b

 

12. Script files sent mostly through email attachment to attack host computer are called ______.

(a) Worms     

(b) Phishing attacks

(c) Trojans

(d) Computer Viruses

Ans. a

 

13. Attacking the victims through fake URL resembling that of a valid financial Institution

is called_____ .

(a) Worms

(b) Phishing attack

(c) Trojans

(d) Computer Viruses

Ans. b

 

14. Getting the user ID and password from avictim through dubious program is called _____attack.

(a) Worms

(b) Phishing attack

(c) Trojan

(d) Computer Viruses

Ans. c

 

15. A malicious program spreading throughInternet and storage media and attacking the data in victims computer is called_______.

(a) Worms

(b) Phishing attack

(c) Trojan

(d) Computer Virus

Ans. d

 

16. Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.

(a) strength

(b) antivirus

(c) vulnerability

(d) port

Ans. c

 

17. Vulnerability for cyber attack may be in______.

(a) operating system

(b) application software

(c) IT infrastructure

(d) all of them

Ans. d

 

18. To protect the network infrastructure from vulnerability, _____ is setup.

(a) firewall

(b) Internet security software

(c) both a & b

(d) none of them

Ans. c

 

19. The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim is called ______ .

(a) hacker     

(b) cracker    

(c) maker       

(d) taker

Ans. a

 

20. Periodic assessment of security vulnerability in computer systems is called _______audit.

(a) threat       

(b) attack

(c) hacking

(d) security

Ans. d

 

21. The security audit team______ to keep the computers safe from cyber attacks.

(a) assesses vulnerability

(b) decides the safety measures through hardware and software

(c) considers latest threat scenario and implements information safety

(d) all of them

Ans. d

 

22. To ensure information safety, ________should be implemented.

(a) physical access security           

(b) password access security

(c) secure IT infrastructure             

(d) all of them

Ans. d

 

23. A single point of access for several networking services is called _____.

(a) Directory Service            

(b) web server

(c) email server                     

(d) none of them

Ans. a

 

24. Directory service permits security administrators to ______.

(a) concentrate on security of directory service instead of individual machines

(b) create new vulnerabilities

(c) damage the security of computers

(d) create new virus

Ans. a

 

25. Directory service should be able to _______in the infrastructure.

(a) include new services

(b) esaily search for information in the network

(c) the information stored on the directory server should be accessible from any operating system

(d) all of them

Ans. d

 

26. LDAP in directory service stands for ______.

(a) Light Weight Director Access Provider

(b) Light Weight Director Access Protocol

(c) Light Weight Director Access Provider

(d) Light Weight Director Access Protection

Ans. b

 

27. Protecting access to a computer through________ is called access control.

(a) physical restriction of entry

(b) password security for login

(c) both a & b

(d) none of them

Ans. c

 

28. Security should be implemented at the stage of ______in software.

(a) development stage

(b) entire life cycle

(c) Sofware Development Life Cycle (SDLC)

(d) all of them

Ans. d

 

29. SDLC in software development stands for _____.

(a) Software Development Life Circus

(b) Software Development Life Cycle

(c) Software Drafting Life Cycle

(d) Software Development Lead Cycle

Ans. b


30. Protection from______ of source code means non-disclosure of the source code to outsiders.

(a) disclosure

(b) alteration

(c) destruction

(d) log of changes (whois making request)

Ans. a

 

31. Protection from ______of source code means alloting the right to edit the source code to authorized persons only.

(a) disclosure

(b) alteration

(c) destruction

(d) log of changes (whois making request)

Ans. b

 

32. Protection from _______of source code means protection of any individual from destroying the software source code.

(a) disclosure

(b) alteration

(c) destruction

(d) log of changes (whois making request)

Ans. c

 

33. Protection from ________of source code means recording all changes made to the source code and the person making such changes.

(a) disclosure

(b) alteration

(c) destruction

(d) log of changes (whois making request)

Ans. d

 

32. _______of access rights in source code development means verification of role before permitting access to source code.

(a) verification

(b) maintaining historical records

(c) error handling

(d) log of changes (whois making request)

Ans. a

 

33. _____in source code development means verification of role before permitting access to source code.

(a) verification

(b) maintaining historical records

(c) error handling

(d) log of changes (whois making request)

Ans. b

 

34. _____in source code development means handling of configuration errors, session errors and exceptions.

(a) verification

(b) maintaining historical records

(c) error handling

(d) log of changes (whois making request)

Ans. c

 

35. Protecting the data divulged by customers from unauthorized access is called____.

(a) privacy protection

(b) audit

(c) antinvirus

(d) vulnerability

Ans a

 

36. Information on criminal records of individuals, financial data of companies, genetic information, address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of debit card, netbanking details, etc. are classified under ______.

(a) privacy protection

(b) audit

(c) antinvirus

(d) vulnerability

Ans. a

 

37. Information security audit may be conducted with reference to _____ .

(a) vulnerabilities

(b) threats

(c) preventive measures

(d) all of them

Ans. d

 

38. Information security audit analyses events of past threats to formulate _____.

(a) security measures

(b) safe practices

(c) software protection

(d) all of them

Ans. d


39. Any single employee ______hold all data needed for making a complete financial transaction.

(a) should not          

(b) should

(c) may

(d) might

Ans. a

 

40. IT audit of the firm should be conducted periodically, which may be every______ .

(a) fortnight

(b) month

(c) quarter

(d) all of them

Ans. d


PDF Download here


Computer History MCQ PDF