Question 1
What is necessary for a cross-site script attack with cookies to be thwarted ?
Question 2
Longhorn was the code name of ?
Question 3
It is stealing ideas or creations of others.
Question 4
Hashed message is signed by a sender using
Question 5
Which of the following are threats to Email Security?
Question 6
Encryption techniques improve a network
Question 7
Malware is used to
Question 8
Full Form of ECB ?
Question 9
Which of the following are categories of spam mails ?
Question 10
Which of the following is not a well known anti-virus program ?
Question 11
Unauthorized access is which type of threats
Question 12
The certificate Authority signs the digital certificate with
Question 13
What does TCP mean ?
Question 14
A virus is a network _______ issue.
Question 15
Data encryption is used for
Question 16
A firewall may be implemented in
Question 17
An SQL injection is often used to attack what ?
Question 18
What could be a good indicator of a Spam email ?
Question 19
Which of the following is not an external threat to a computer or a computer network ?
Question 20
Unauthorized access is a network _______ issue.
Question 21
Which of the following HTTP method is considered insecure ?
Question 22
Malware is short for
Question 23
Firewall is type of threat
Question 24
This is not a benefit of Big Data analytics
Question 25
Firewall is a type of ____________.
Question 26
EDI (Electronic Data Interchange) use
Question 27
Firewall is a type of
Question 28
Encryption can be done
Question 29
Which of the following is not a VALID type of firewall ?
Question 30
Which of the following option is not best described about industry 4.0
Question 31
What are TLS and SSL ?
Question 32
The Acronym DES stands for
Question 33
What is another name for Internet Layer ?
Question 34
Which of the following is the collective name for Trojan horses, spyware, and worms ?
Question 35
A company requires its users to change passwords every month. This improves the _______ of the network
Question 36
Which of the following are network reliability issues ?
Question 37
A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network
Question 38
Unsolicited commercial email is known as
Question 39
Full Form of MMS ?
Question 40
Firewall as part of a router program
Question 41
Public key system is useful because
Question 42
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
Question 43
This is not type of cyber attacks
Question 44
—— refers to electronic trespassing or criminal hacking.
Question 45
Cryptography technique is used in ________.
Question 46
Which of the following technique is used to verify the integrity of the message ?
Question 47
What is Phishing ?
Question 48
It allow a visited website to store its own information about a user on the users computer.
Question 49
When an earthquake severs a fiber-optic cable, this is a network _______ issue
Question 50
By symmetric key encryption we mean
Question 51
What is network topology ?
Question 52
Which of the following is a VALID digital signature key ?
Question 53
Which of the following is a valid Cyber / Internet Security requirement ?
Question 54
Data security threats include
Question 55
Included in internet of things
Question 56
Passwords are used to improve the _______ of a network.
Question 57
What Security trade off occurs while using IDS (Intrusion Detection System) ?
Question 58
EDI (Electronic Data Interchange) standard
Question 59
What is the top method an attacker might infect a target ?
Question 60
_______ is a network reliability issue.
Question 61
Network failure is primarily a _______ issue.
Question 62
When a hacker penetrates a network, this is a network _______ issue
Question 63
Who is known as the Human Computer of India ?
Question 64
IOT stand for
Question 65
Which of the following are preventive antivirus measures ?
Question 66
TCP is used for what three main functions ?
Question 67
The objective for industry 4.0 is
Question 68
Which of the following is an anti-virus program
Question 69
For secure EDI (Electronic Data Interchange) transmission on internet
Question 70
Viruses are __________.
Question 71
What is IMAP ?
Question 72
What are types of malware ?
Question 73
When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
Question 74
_____________ monitors user activity on internet and transmit that information in the background to someone else..
Question 75
Computer viruses are man made
Question 76
Which of the following is a VALID authorization key ?
Question 77
A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network
Question 78
Digital signatures provide which of the following ?
Question 79
By encryption of a text we mean
Question 80
What is the full form of ABRS ?
Question 81
When is encrypted data the safest ?
Question 82
A firewall is a
Question 83
When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the _______ of the network.
Question 84
A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
Question 85
A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network.
Question 86
Which of the following is digital certificate standard ?
Question 87
Hacking a computer is always illegal and punishable by law.
Question 88
Which of these is an example of a possible victim in a phishing attack ?
Question 89
Unauthorized access and viruses are issues dealing with network
Question 90
Backup your files regularly to prevent cyber security attacks
Question 91
The number of users on a network has the greatest impact on the network
Question 92
Transit time and response time measure the _______ of a network
Question 93
Exploring appropriate and ethical behaviours related to online environments and digital media.
Question 94
An unauthorized user is a network _______ issue.
Question 95
Which day is celebrated as world Computer Literacy Day ?
Question 96
What is a smart factory ?
Question 97
Included in Artificial intelligence
Question 98
When a server goes down, this is a network _______ issue.
Question 99
How many keys are required if two parties communicate using Asymmetric Cryptography ?
Question 100
Which of the following principle is violated if computer system is not accessible ?