info@uceagra.com
Student Enquery: +91 79005 25060
Franchise Enquery: +91 80771 91427
Work With Us
Home
(current)
Exam Portal
Online Test
Downloads
CCC Admit Card
CCC Form Apply
CCC Certificate
CCC Result
Typing Test
English Typing
Hindi Typing
Gallery
Videos
Contact us
Join us
About Us
Feedback
FAQ's
100 MCQ of Cyber Security
Question 1
In computer security, …………. Means that the information in a computer system only be accessible viewing by authorised parities... कंप्यूटर सुरक्षा में ....... का अर्थ है कि कंप्यूटर प्रणाली में सूचना केवल अधिकृत पार्टिज द्वारा देखने योग्य हो।
A) Availability
B) Integrity
C) Confidentiality
D) All of the above
Question 2
Which protection method is used to monitoring who can access the data for what purpose किसी सुरक्षा विधि का उपयोग निगरानी के लिए किया जाता है कि कौन किस उद्देश्य के लिए डेटा तक पहुंच सकता है ?
A ) System Access Control
B) System Design
C) Data Access Control
D) None of above
Question 3
Encryption techniques improve a network`s------- एन्क्रिप्शन तकनीक एक नेटवर्क...........को बेहतर बनाती है।
A ) Performance
B) Security
C) Reliability
D) None of above
Question 4
The main goals of secure computing is सुंरक्षित कंप्यूटिंग का मुख्य लक्ष्य है..........
A ) Confidentiality
B) Interruption
C) Modification
D) All of these
Question 5
----------means that sender must not be able to deny sending a message that he sent. ..............इसका मतलब है कि प्रेषक को एक मैसेज भेजने से इनकार करने में सक्षम नहीं होना चाहिए जो उसने भेजा था।
A) Non-repudiation
B) Integrity
C) Authentication
D) None of the above
Question 6
In computer security,……. Means that computer system assets can be modified only by authorised parities. कंप्यूटर सुरक्षा में .... का मतलब है कि कंप्यूटर सिस्टम की संपति को केवल अधिकृत समानताएं द्वारा संशधित किया जा सकता है।
A) Confidentiality
B) Availability
C) Integrity
D) All of the above
Question 7
Which of the following is not a method to provide protection?- निम्नलिखित मे से कौन सुरक्षा प्रदान करने की एक विधि नहीं हैं।
A) System Design
B) Data Access Controls
C) System Access Controls
D) None of above
Question 8
In computer security integrity refer to कंप्यूटर सूरक्षा में इंटीग्रिटी को देखें
A) Viewing and printing of data
B) Access to computer coerces with difficulties
C) Separation and protection of the resources data
D) All of the above
Question 9
------- refers to the situation in which services or data become unavailable unusable and destroyed. ......उस स्थिति को संदर्भित करता है जिसमें सेवाए या डेटा अनुपलब्ध अनुपयोगी और नष्ट हो जाते हैं।
A) Confidentiality
B) Interruption
C) Integrity
D) All of these
Question 10
Authentication is प्रमाणीकरण है
A) Hard to assure identity of user on a remote system
B) Insertion
C) Modification
D) All of the above
Question 11
Which of the following means that the receiver is ensured that the massage is coming from the intended sender not an imposer निम्न में से किस का अर्थ है कि रिसीवर सुनिश्चित करता है कि मैसेज किसी प्रेषक से नहीं बल्कि इच्छित पे्रषक से हो रही है।
A) Availability
B) Availability
C) Authentication
D) All of the above
Question 12
------- means to prove/verify the identity of the entity tries to access the system’s resources. .........का मतलब उस संस्था की पहचान को प्राणित /सत्यापित करना है जो सिस्टम के संसाधानों तक पहुँचने की कोशिश करती है।
A) Message authentication
B) Password authentication
C) Entity authentication
D) All of the above
Question 13
Software programs that close potential security breaches in an operating system are down as सोफ्टवेयर प्रोग्राम जो एक ओपरेटिंग सिस्टम में संभावित सुरक्षा ब्रिचेस के रूप में जाने जाते हैं।
A) Security patches
B) Refresh patches
C) Security breath fixes
D) All of the above
Question 14
Major security problem for operation system is सिस्टम ओपरेशन के लिए एक बडी सुरक्षा समस्या है
A) Physical problem
B) Human problem
C) Authentication problem
D) All of the above
Question 15
Malware is use to मैलवेयर का उपयोग किया जाता हैं।
A) Disrupt computer operation
B) Gather sen sit information
C) Both a & b
D) All of the above
Question 16
The aspect of security that falls when an email in intercepted is सुरक्षा का वह पहलू जो विफल हो जाता है जब ईमेल काइंटरसेप्ट किया गया होता है
A) Integrity
B) Privacy
C) Authentication
D) All of these
Question 17
The creeper virus was eventually deleted by a program known as ------ क्रपीर वायरस को अंततः....... नामक एक कार्यक्रम द्वारा हटा दिया गया था।
A) The weeper
B) The reaper
C) The cheaper
D) None of above
Question 18
For secure Electronic Data Interchange (EDI) transmission on internet used-- इंटरनेट पर सुरक्षित इलेक्ट्रॅानिक डाटा इंटरचेंज टांसमिशन के लिए उपयोग किया जाता है।
A) TCP/IP
B) MIME
C) S/MIME
D) None of the above
Question 19
What are the three basic component of computer security कंप्यूटर सुरक्षा के तीन बुनियादी घटक क्या हैं।
A) Confidentiality, integrity ,availability
B) Control intelligence action
C) Central intelligence agency
D) Confidence integrity action
Question 20
The secure Electronic transaction protocol is used for which type of payment सुरक्षित इलेक्ट्रोनिक लेनदेन प्राटोकोल का उपयोग किस प्रकार के भुगतान के लिए किया जाता है।
A) Credit card
B) NEFT
C) Cheque
D) Cheque
Question 21
Data security threats include डेटा सुरक्षा खतरों में शमिल हैं
A) Hardware failure
B) Privacy invasion
C) Fraudulent manipulation of data
D) All of the above
Question 22
Which of the following is/are threat(s) for electronic payment system निम्नलिखत में सें कौन इलेक्ट्रोनिक भुगतान प्रणाली के लिए खतरा है।
A) Computer virus
B) Trojan horse
C) Computer worms
D) All of the above
Question 23
In SET protocol a customer sends a purchase order SET प्रोटोकोल में एक ग्राहक एक खरीद आदेश भेजता है
A) Using digital signature system
B) In a plain text form
C) Encrypted with his public key
D) None of above
Question 24
Which of the following is a class of computer thereat प्रोटोकोल में एक ग्राहक एक खरीद आदेश भेजता है
A) Soliciting
B) Stalking
C) Dos attack
D) All of these
Question 25
Trend micro is a ट्रेंड माइक्रो एक है।
A) Program
B) Antivirus software
C) Virus program
D) All of these
Question 26
Firewall is a type of फायरवोल एक प्रकार है।
A) Output device
B) Virus
C) Threat
D) None
Question 27
Unauthorised access is which type of network issue. अनाधिकृत पहुँच किस प्रकार की नेटवर्क समस्या है।
A) Security
B) Reliability
C) Performance
D) None of these
Question 28
Included in Industry उद्योग 4.0 में शमिल है ।
A) Internet of things
B) Cloud computing
C) Artificial
D) All of the above
Question 29
Vision of the Industry 4.0 is उद्योग का विजन 4.0 है।
A) Internet of things
B) Internet of Service
C) A and B both
D) None
Question 30
Included In internet of things. इंटरनेट ओफ थिंग्स में शमिल है
A) Software
B) Sensors actuator
C) Wi-Fi Technique
D) All of the above
Question 31
This is not a benefit of big Data Analytics. यह बिग डेटा एनालिटिक्स का लाभ नहीं हैं।
A) Faster better decision making
B) Cost reduction
C) Manage of data
D) None of the above
Question 32
Which is a mobile social network? यह बिग डेटा एनालिटिक्स का लाभ नहीं हैं।
A) Facebook
B) Instagram
C) Twitter
D) All
Question 33
Which is a benefit of cloud Computing क्लाउड कम्प्यूटिंग के लाभ कौन .. कौन सा हैं।
A) Low cost
B) Fast speed
C) More secure
D) All of the above
Question 34
Included in Artificial Intelligence. आर्टिफिशियल इंटेलीजेंस में शमिल हैं।
A) Knowledge
B) Planning
C) Both a & b
D) None
Question 35
This is not a type of cyber attacks. निम्न में सें कौन साइबर सुरक्षा का प्रकार नही है।
A) Attacks on confidentiality
B) Attacks on integrity
C) Attacks on property
D) All of the above
Question 36
--------ensures that unauthorized users do not access the system यह सुनिश्चित करता है कि अनाधिकृत उनयोगकर्ता सिस्टम का उपयोग न करें।
A) System Design
B) Data access control
C) System access control
D) All of these
Question 37
Benefit of robotic process automation is रोबोटिक प्रोसेस ओटोमेशन का लाभ हैं।
A) Enable better customer service
B) Enable employees productive
C) Processes to be complete more rapidly
D) All of the above
Question 38
This certificates will be issued for both business and individuals use यह प्रमाण पत्र व्यवसाय और व्यक्तियों के उपयोग के लिए जारी किया जाऐगा
A) Class 3
B) Class 2
C) Class 1
D) All
Question 39
-----is are the branch of information technology which is intended to protect computer सूचन प्रद्योगिकी की एक शाखा है जिसका उद्देश्य कंप्यूटर की सुरक्षा करना है।
A) Cyber security
B) IT security
C) Information security
D) All of these
Question 40
This is a type of SSL certificate. यह एक प्रकार का एसएसएल प्रमाण पत्र है।
A) Wildcard
B) Extended
C) Unified
D) All
Question 41
Which of the following tools / applications relates to industry 4.0 उद्योग 4.0 के लिए कितने डिजाइन सिद्धांत लागू होते है।
A) Condition monitoring
B) Performance manager
C) 3D visualization
D) None of above
Question 42
-------design principles are applied for Industry 4.0 डिजाईन सिद्धान्तों को उद्योग 4.0 के लिए लागू किया जाता है।
A) Four
B) Two
C) Six
D) None of above
Question 43
The objective for industry 4.0 is उद्योग 4.0 का उद्देश्य है।
A) Increase efficiency
B) Reduced complexity
C) Enabled self controlling
D) All above
Question 44
IIoT stand for -----IIoT स्टैंड करता है।
A) Industrial internet of things
B) Intranet of things
C) Internet of Things
D) All of above
Question 45
IoT stand for स्टैड करत है।
A) Internet of things
B) Industry of things
C) Internet of things
D) None of above
Question 46
Which industry branches are auditable for industry 4.0 development उद्योग 4.0 विकास के लिए कौन सी उद्योग शाखाए उपयुक्त है।
A) Industries 4.0 can be used in all industrial contexts where processes need to be more intelligent
B) Industry 4.0 is in fist instance an enrichment for the service industry
C) Especially in the automotive and agricultural sector
D) None of above
Question 47
Which of the following option is not best described about industry 4.0उद्योग 4.0 के बारे में निम्नलिखित में सें कौन सा विक्लप सबसे उपयुक्त नही है।
A) Smart factory
B) Speed
C) Analytics
D) None of above
Question 48
What is a smart factory ? स्मार्ट फैक्टरी क्या है।
A) Factories and logistic systems that will operate and organize themselves without human interactio
B) Robots who will replace people
C) Both a & b
D) None of above
Question 49
Which social media is more based on mobile compare desktop ? डेस्कटोप की तुलना मोबाइल पर कौन सा सोशल मीडिया अधिक है।
A) Facebook
B) Twitter
C) Instagram
D) None
Question 50
Which social media is more based on image and video ? कौन सा सोशल मिडिया इमेज और वीडियो पर आधारित है।
A) Facebook
B) Instagram
C) Twitter
D) None
Question 51
A firewall may be implemented in routers which connect intranet to internet .
A) True
B) False
Question 52
A which is a network security issue ?
A) True
B) False
Question 53
When a server goes down this is a network reliality issue ?
A) True
B) False
Question 54
Spyware monitors user activity on internet and transmit that information in the background to someone else.
A) True
B) False
Question 55
Firewall is a program of hardware that filters the information coming through an internet connection to a network or computer system.
A) True
B) False
Question 56
The main function of proxy application gateway firewall is to allow internet users to securely use specified internet services.
A) True
B) False
Question 57
A firewall is a security device deployed at the boundary of a corporate intranet to protect it from unauthorized access.
A) True
B) False
Question 58
Industry 4.0 is a new technology for politician
A) True
B) False
Question 59
The certificate authority signs the digital certificate whit its own private key.
A) True
B) False
Question 60
Industry 4.0 is based on the base of development of machines.
A) True
B) False
Question 61
In the smart factory workers machines and resources communicate easily.
A) True
B) False
Question 62
Phishing is a form of fraud where fraudulent emails are sent from reputable sources
A) True
B) False
Question 63
The step data-information –knowledge-wisdom-decision turn big data become smart data
A) True
B) False
Question 64
If’s is missing in the URL means that site is secure.
A) True
B) False
Question 65
The objective if industry 4.0 is increase efficiency.
A) True
B) False
Question 66
Sophisticated software programs are used for Big data Analytics.
A) True
B) False
Question 67
Example of social network are face book, twitter etc.
A) True
B) False
Question 68
LinkedIn is the largest mobile social network.
A) True
B) False
Question 69
Instagram is a mobile social media owned by Google.
A) True
B) False
Question 70
Companies providing cloud services enable users to store files and applications on remote servers,and then access
A) True
B) False
Question 71
Microsoft azure is an example of public cloud.
A) True
B) False
Question 72
Amazon elastic is an example of private cloud.
A) True
B) False
Question 73
The way of industry 4.0 leads to the connectivity of virtual world and physical objects.
A) True
B) False
Question 74
The internet of things allows to interact and exchange data with device .
A) True
B) False
Question 75
In the internet of things information system can not be access remotely.
A) True
B) False
Question 76
Data may be collected from social network digital image sensor and sales transaction.
A) True
B) False
Question 77
Software as a service a platform for creating software.
A) True
B) False
Question 78
Virtual Reality and augmented Reality are two sides of the same coin
A) True
B) False
Question 79
Robotics is also a major field related to Artificial intelligence.
A) True
B) False
Question 80
Robotic process automation (RPA) is a part of an organization’s IT infrastructure.
A) True
B) False
Question 81
Block chain was invented by a person using the name satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency bit coin.
A) True
B) False
Question 82
Oculus Rift oculus VR and face book are the major players in Virtual Reality.
A) True
B) False
Question 83
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’ s network.
A) True
B) False
Question 84
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
A) True
B) False
Question 85
Digital signatures develop tow type of key one private key and second public key that are mathematically linked…..
A) True
B) False
Question 86
Attacks on confidentiality are not a type of cyber attacks.
A) True
B) False
Question 87
Publishing is the type of cyber security?
A) True
B) False
Question 88
Six design principles are applied for Industry 4.0 .
A) True
B) False
Question 89
Facebook and Instagram a mobile social Network.
A) True
B) False
Question 90
Firewall is a type to threat.
A) True
B) False
Question 91
Computer viruses are man made.
A) True
B) False
Question 92
Low cost and Fast speed of a benefit of could computing .
A) True
B) False
Question 93
Attacks on integrity the type of cyber security.
A) True
B) False
Question 94
Instagram social media is more based on mobile compare desktop.
A) True
B) False
Question 95
Trend micro is a program.
A) True
B) False
Question 96
A block chain carries on transaction cost.
A) True
B) False
Question 97
Big online business website like flipkart snapdeal uses face book or Gmail data to view the customer information or behavior.
A) True
B) False
Question 98
Cloud computing offers online development and deployment tools programming runtime environment .
A) True
B) False
Question 99
Back up your files regularly to prevent cyber security attacks.
A) True
B) False
Question 100
A typical enterprise uses multiple and disconnect IT systems to run its operations.
A) True
B) False