info@uceagra.com
Student Enquery: +91 79005 25060
Franchise Enquery: +91 80771 91427
Work With Us
Home
(current)
Exam Portal
Online Test
Downloads
CCC Admit Card
CCC Form Apply
CCC Certificate
CCC Result
Typing Test
English Typing
Hindi Typing
Gallery
Videos
Contact us
Join us
About Us
Feedback
FAQ's
100 MCQ of Cyber Security
Question 1
What is necessary for a cross-site script attack with cookies to be thwarted ?
(A) CAPTCHAs
(B) Virtual machines
(C) Proxies
(D) Firewalls
Question 2
Longhorn was the code name of ?
(A) Windows Vista
(B) Windows XP
(C) Windows 7
(D) Windows 10
Question 3
It is stealing ideas or creations of others.
(A) Plagiarism
(B) Intellectual Property Rights
(C) Piracy
(D) All of the above
Question 4
Hashed message is signed by a sender using
(A) His Public key
(B) His Private Key
(C) Receivers Public Key
(D) Receivers Public Key
Question 5
Which of the following are threats to Email Security?
(A) Viruses
(B) Trojans
(C) Spams
(D) All of the above
Question 6
Encryption techniques improve a network
(A) Performance
(B) Reliability
(C) Security
(D) Longevity
Question 7
Malware is used to
(A) Disrupt computer operation
(B) Gather sensitive information
(C) Both A and B
(D) All of the Above
Question 8
Full Form of ECB ?
(A) External Commercial Borrowings
(B) Exta Commercial Borrow
(C) External Computer Borrowings
(D) None
Question 9
Which of the following are categories of spam mails ?
(A) Phishing and Fraud
(B) Spoofing mails
(C) Chain mails
(D) All of the Above
Question 10
Which of the following is not a well known anti-virus program ?
(A) AVAST
(B) SMAG
(C) AVG
(D) McAFee
Question 11
Unauthorized access is which type of threats
(A) Security
(B) Reliability
(C) Performance
(D) None of these
Question 12
The certificate Authority signs the digital certificate with
(A) Users public key
(B) Users Private Key
(C) Its own public key
(D) Its own Private key
Question 13
What does TCP mean ?
(A) Total Content Positioning
(B) Transmission Control Protocol
(C) Transmittable Constant Protocol
(D) Technical Control Panel
Question 14
A virus is a network _______ issue.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 15
Data encryption is used for
(A) Security
(B) Performance
(C) Storage
(D) All of above
Question 16
A firewall may be implemented in
(A) routers which connect intranet to internet
(B) bridges used in an intranet
(C) expensive modem
(D) users application programs
Question 17
An SQL injection is often used to attack what ?
(A) Small scale machines such as diebold ATMs
(B) Large-scale sequel databases such as those containing credit card information.
(C) Servers running SQL databases similar to Hadoop or Hive.
(D) Servers built on NoSQL
Question 18
What could be a good indicator of a Spam email ?
(A) Something that sounds too good to be true
(B) An email that contains plenty of grammar mistakes
(C) An email sent to a bunch of random people
(D) All of These
Question 19
Which of the following is not an external threat to a computer or a computer network ?
(A) Ignorance
(B) Trojan horses
(C) Adware
(D) Crackers
Question 20
Unauthorized access is a network _______ issue.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 21
Which of the following HTTP method is considered insecure ?
(A) POST
(B) DELETE
(C) TRACE
(D) GET
Question 22
Malware is short for
(A) Malicious Software
(B) Malicious Systems
(C) Maliant Software
(D) Maliant Systems
Question 23
Firewall is type of threat
(A) True
(B) False
Question 24
This is not a benefit of Big Data analytics
(A) Faster, better decision making
(B) Cost Reduction
(C) Manage of Data
(D) None of the above
Question 25
Firewall is a type of ____________.
(A) Virus
(B) Security threat
(C) Worm
(D) None of the above
Question 26
EDI (Electronic Data Interchange) use
(A) requires an extranet
(B) requires value added network
(C) can be done on internet
(D) requires a corporate intranet
Question 27
Firewall is a type of
(A) Output device
(B) Virus
(C) Threat
(D) None of These
Question 28
Encryption can be done
(A) Only on Textual data
(B) only on ASCII coded data
(C) On any Bit String
(D) only on mnemonic data
Question 29
Which of the following is not a VALID type of firewall ?
(A) Application-level gateways
(B) Circuit-level gateways
(C) Proxy Server Gateways
(D) Packet filters
Question 30
Which of the following option is not best described about industry 4.0
(A) Smart factory
(B) Speed
(C) Analytics
(D) None of above
Question 31
What are TLS and SSL ?
(A) Internet protocols
(B) Network layers
(C) Internet layers
(D) Cryptographic protocols
Question 32
The Acronym DES stands for
(A) Digital Evaluation System
(B) Digital Encryption Standard
(C) Digital Encryption System
(D) Double Encryption Standard
Question 33
What is another name for Internet Layer ?
(A) TCP layer
(B) Interwebs
(C) IP layer
(D) SSL layer
Question 34
Which of the following is the collective name for Trojan horses, spyware, and worms ?
(A) Spware
(B) Botnets
(C) Virus
(D) Malware
Question 35
A company requires its users to change passwords every month. This improves the _______ of the network
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 36
Which of the following are network reliability issues ?
(A) Frequency of Failure
(B) recovery time after a failure
(C) catastrophe
(D) All of the above
Question 37
A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 38
Unsolicited commercial email is known as
(A) Spam
(B) Malware
(C) Virus
(D) Spyware
Question 39
Full Form of MMS ?
(A) multimedia messaging service
(B) multi messaging service
(C) multiple messaging service
(D) multi mobile service
Question 40
Firewall as part of a router program
(A) filters only packets coming from internet
(B) filters only packets going to internet
(C) filters packets travelling from and to the intranet from the internet
(D) ensures rapid traffic of packets for speedy e-Commerce
Question 41
Public key system is useful because
(A) It uses Two Keys
(B) there is no key distribution problem as public key can be kept in a commonly accessible database
(C) Private Key can be Kept Secret
(D) It is a Symmetric Key System.
Question 42
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
(A) Anti virus
(B) Cookies
(C) Firewall
(D) Cyber safety
Question 43
This is not type of cyber attacks
(A) Attacks on confidentiality
(B) Attacks on integrity
(C) Attacks on property
(D) All of the above
Question 44
—— refers to electronic trespassing or criminal hacking.
(A) Cracking
(B) Jacking
(C) Spoofing
(D) Smarming
Question 45
Cryptography technique is used in ________.
(A) Polling
(B) Job Scheduling
(C) Protection
(D) File Management
Question 46
Which of the following technique is used to verify the integrity of the message ?
(A) Message digest
(B) Digital signature
(C) Decryption algorithm
(D) Protocol
Question 47
What is Phishing ?
(A) Fraudulently acquiring sensitive information.
(B) An encryption technique
(C) An anti-spam technique
(D) A password building technique
Question 48
It allow a visited website to store its own information about a user on the users computer.
(A) Spam
(B) Cookies
(C) Malware
(D) Adware
Question 49
When an earthquake severs a fiber-optic cable, this is a network _______ issue
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 50
By symmetric key encryption we mean
(A) one private key is used for both encryption and decryption
(B) private and public key used are symmetric
(C) only public keys are used for encryption
(D) only symmetric key is used for encryption
Question 51
What is network topology ?
(A) It is the inner networkings of a single computer.
(B) It is the top layer of a computer network.
(C) It is the framework of the components of a computer network.
(D) It is the entirety of the data of a computer network.
Question 52
Which of the following is a VALID digital signature key ?
(A) Public signature authentication key
(B) Private signature authentication key
(C) Symmetric signature authentication key
(D) Private signature key
Question 53
Which of the following is a valid Cyber / Internet Security requirement ?
(A) Authentication
(B) Integrity
(C) Confidentiality
(D) All of the given options are correct
Question 54
Data security threats include
(A) Hardware Failure
(B) Privacy Invasion
(C) Fraudulent Manipulation of Data
(D) All of the Above
Question 55
Included in internet of things
(A) Software
(B) Sensors, Actuator
(C) WIFI Technique
(D) All of the Above
Question 56
Passwords are used to improve the _______ of a network.
(A) Performance
(B) Reliability
(C) Security
(D) Longevity
Question 57
What Security trade off occurs while using IDS (Intrusion Detection System) ?
(A) Change in permission
(B) Login Failures
(C) Change in privilege
(D) Performance degradation
Question 58
EDI (Electronic Data Interchange) standard
(A) is not easily available
(B) defines several hundred transaction sets for various business forms
(C) is not popular
(D) defines only a transmission protocol
Question 59
What is the top method an attacker might infect a target ?
(A) Social engineering, or psychological manipulation.
(B) SQL injection
(C) Buffer overflow
(D) Hacking via the Internet
Question 60
_______ is a network reliability issue.
(A) The number of users
(B) The type of transmission medium
(C) The frequency of failure
(D) Unauthorized access
Question 61
Network failure is primarily a _______ issue.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 62
When a hacker penetrates a network, this is a network _______ issue
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 63
Who is known as the Human Computer of India ?
(A) Shakunthala Devi
(B) Savitri Devi
(C) Suman Devi
(D) Kamala Devi
Question 64
IOT stand for
(A) Intranet of things
(B) Industry of things
(C) Internet of things
(D) None of above
Question 65
Which of the following are preventive antivirus measures ?
(A) Do not open attachments from suspicious sources.
(B) Delete chain and junk mails.
(C) Backup your files.
(D) All of the above
Question 66
TCP is used for what three main functions ?
(A) Connect to the Web, deliver email, and transfer files.
(B) Connect to the Web, compress data, encrypt mail.
(C) Connect to the web, conceal data, transfer files.
(D) Connect to the Web, encrypt data, transmit information.
Question 67
The objective for industry 4.0 is
(A) Increase efficiency
(B) Reduced complexity
(C) Enabled self controlling
(D) All of above
Question 68
Which of the following is an anti-virus program
(A) Norton
(B) K7
(C) Quick heal
(D) All of these
Question 69
For secure EDI (Electronic Data Interchange) transmission on internet
(A) MIME is used
(B) S/MIME is used
(C) PGP is used
(D) TCP/IP is used
Question 70
Viruses are __________.
(A) Man made
(B) Naturally occur
(C) Machine made
(D) All of the above
Question 71
What is IMAP ?
(A) Internet Messaging Application
(B) Interanet Messaging Application
(C) Interanet Message Access Protocol
(D) Internet Message Access Protocol
Question 72
What are types of malware ?
(A) Viruses
(B) Spyware
(C) Worms
(D) All of these
Question 73
When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
(A) Bullying
(B) Stalking
(C) Identity theft
(D) Phishing
Question 74
_____________ monitors user activity on internet and transmit that information in the background to someone else..
(A) Malware
(B) Spyware
(C) Adware
(D) None of these
Question 75
Computer viruses are man made
(A) True
(B) False
Question 76
Which of the following is a VALID authorization key ?
(A) Public authorization key
(B) Public ephemeral key authorization key
(C) Asymmetric authorization keys
(D) Symmetric authorization keys
Question 77
A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 78
Digital signatures provide which of the following ?
(A) Authentication
(B) Non-repudiation
(C) Integrity protection
(D) All of the given options are correct
Question 79
By encryption of a text we mean
(A) Compressing it
(B) expanding it
(C) scrambling it to preserve its security
(D) Hashing it
Question 80
What is the full form of ABRS ?
(A) Aadhaar Based Remittance Service
(B) Aadhaar Board Remittance Service
(C) Advance Based Remittance Service
(D) None
Question 81
When is encrypted data the safest ?
(A) When it is being transferred via usb stick.
(B) When it is in transit.
(C) When it is being written. When it is at rest.
(D) When it is being written.
Question 82
A firewall is a
(A) wall built to prevent fires from damaging a corporate intranet
(B) security device deployed at the boundary of a company to prevent unauthorized physical access
(C) security device deployed at the boundary of a corporate intranet to protect it from unauthorized
(D) device to prevent all accesses from the internet to the corporate intranet
Question 83
When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the _______ of the network.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 84
A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
(A) perform better
(B) more reliable
(C) more secure
(D) more error-free
Question 85
A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 86
Which of the following is digital certificate standard ?
(A) X.508
(B) X.509
(C) D.509
(D) None of the Above
Question 87
Hacking a computer is always illegal and punishable by law.
(A) True
(B) False
Question 88
Which of these is an example of a possible victim in a phishing attack ?
(A) The website that was hacked
(B) The person who had their identity stolen
(C) The bank of the victim
(D) All of These
Question 89
Unauthorized access and viruses are issues dealing with network
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 90
Backup your files regularly to prevent cyber security attacks
(A) True
(B) False
Question 91
The number of users on a network has the greatest impact on the network
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 92
Transit time and response time measure the _______ of a network
(A) Performance
(B) Reliability
(C) Security
(D) Longevity
Question 93
Exploring appropriate and ethical behaviours related to online environments and digital media.
(A) Cyber ethics
(B) Cyber security
(C) Cyber safety
(D) Cyber law
Question 94
An unauthorized user is a network _______ issue.
(A) Performance
(B) Reliability
(C) Security
(D) All the above
Question 95
Which day is celebrated as world Computer Literacy Day ?
(A) December 2
(B) November 2
(C) December 12
(D) November 12
Question 96
What is a smart factory ?
(A) Factories and logistic systems that will operate and organize themselves without human interacti
(B) Robots who will replace people
(C) Both a & b
(D) None of above
Question 97
Included in Artificial intelligence
(A) Knowledge
(B) Planning
(C) Both a & b
(D) None of These
Question 98
When a server goes down, this is a network _______ issue.
(A) Performance
(B) Reliability
(C) Security
(D) None of the above
Question 99
How many keys are required if two parties communicate using Asymmetric Cryptography ?
(A) One
(B) Two
(C) Three
(D) Four
Question 100
Which of the following principle is violated if computer system is not accessible ?
(A) Confidentiality
(B) Availability
(C) Access Control
(D) Authentication