info@uceagra.com
Student Enquery: +91 79005 25060
Franchise Enquery: +91 80771 91427
Work With Us
Home
(current)
Exam Portal
Online Test
Downloads
CCC Admit Card
CCC Form Apply
CCC Certificate
CCC Result
Typing Test
English Typing
Hindi Typing
Gallery
Videos
Contact us
Join us
About Us
Feedback
FAQ's
100 MCQ of Cyber Security
Question 1
Which of the following is an anti-virus program
A) Norton
B) K7
C) Quick heal
D) All of these
Question 2
All of the following are examples of real security and privacy threats except:
A) Hackers
B) Virus
C) Spam
D) Worm
Question 3
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves.
A) True
B) False
Question 4
_____________ monitors user activity on internet and transmit that information in the background to someone else.
A) Malware
B) Spyware
C) Adware
D) None of these
Question 5
Viruses are __________.
A) Man made
B) Naturally occur
C) Machine made
D) All of the above
Question 6
Firewall is a type of ____________.
A) Virus
B) Security threat
C) Worm
D) None of the above
Question 7
Unsolicited commercial email is known as ____________.
A) Spam
B) Malware
C) Virus
D) Spyware
Question 8
Which of the following is not an external threat to a computer or a computer network.
A) Ignorance
B) Trojan horses
C) Adware
D) Crackers
Question 9
When a person is harassed repeatedly by being followed, called or be written to he / she is a target of.
A) Bullying
B) Stalking
C) Identity theft
D) Phishing
Question 10
Which of the following is a class of computer threat.
A) Phishing
B) Soliciting
C) DoS attacks
D) Stalking
Question 11
A license allows a user to use copyrighted material.
A) True
B) False
Question 12
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
A) Anti virus
B) Cookies
C) Firewall
D) Cyber safety
Question 13
It allow a visited website to store its own information about a user on the user’s computer.
A) Spam
B) Cookies
C) Malware
D) Adware
Question 14
It is stealing ideas or creations of others.
A) Plagiarism
B) Intellectual Property Rights
C) Piracy
D) All of the above
Question 15
Hacking a computer is always illegal and punishable by law.
A) True
B) False
Question 16
Exploring appropriate and ethical behaviors related to online environments and digital media.
A) Cyber ethics
B) Cyber security
C) Cyber safety
D) Cyber law
Question 17
Which of the following is digital certificate standard ?
A) X.508
B) X.509
C) D.509
D) None of the Above
Question 18
Which of the following technique is used to verify the integrity of the message ?
A) Message digest
B) Digital signature
C) Decryption algorithm
D) Protocol
Question 19
Which of the following principle is violated if computer system is not accessible ?
A) Confidentiality
B) Availability
C) Access Control
D) Authentication
Question 20
Transit time and response time measure the _______ of a network.
A) Performance
B) Reliability
C) Security
D) Longevity
Question 21
Network failure is primarily a _______ issue.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 22
_______ is a network reliability issue.
A) The number of users
B) The type of transmission medium
C) The frequency of failure
D) Unauthorized access
Question 23
_______ is a network reliability issue.
A) Catastrophe
B) The number of users
C) The type of transmission medium
D) Unauthorized access
Question 24
Unauthorized access is a network _______ issue.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 25
A virus is a network _______ issue.
A) Performance
B) Reliability
C) Security
D) none of the above
Question 26
A _______ is illicitly introduced code that damages a network device.
A) Protocol
B) Virus
C) Catastrophe
D) Medium
Question 27
Passwords are used to improve the _______ of a network.
A) Performance
B) Reliability
C) Security
D) Longevity
Question 28
Unauthorized access and viruses are issues dealing with network _______
A) Performance
B) Reliability
C) Security
D) None of the above
Question 29
Which of the following are network reliability issues ?
A) frequency of failure
B) recovery time after a failure
C) catastrophe
D) all of the above
Question 30
When a hacker penetrates a network, this is a network _______ issue
A) Performance
B) Reliability
C) Security
D) None of the above
Question 31
When a server goes down, this is a network _______ issue.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 32
When an earthquake severs a fiber-optic cable, this is a network _______ issue.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 33
When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the______ of the network.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 34
A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 35
A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 36
A company requires its users to change passwords every month. This improves the _______ of the network.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 37
A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network.
A) Performance
B) Reliability
C) Security
D) None of the above
Question 38
A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
A) perform better
B) more reliable
C) more secure
D) more error-free
Question 39
What Security tradeoff occurs while using IDS (Intrusion Detection System) ?
A) Change in permission
B) Login Failures
C) Change in privilege
D) Performance degradation
Question 40
EDI (Electronic Data Interchange) use.
A) requires an extranet
B) requires value added network
C) can be done on internet
D) requires a corporate intranet
Question 41
EDI (Electronic Data Interchange) over internet uses.
A) MIME to attach EDI forms to e-mail messages
B) FTP to send business forms
C) HTTP to send business forms
D) SGML to send business forms
Question 42
For secure EDI (Electronic Data Interchange) transmission on internet.
A) MIME is used
B) S/MIME is used
C) PGP is used
D) TCP/IP is used
Question 43
EDI (Electronic Data Interchange) standard.
A) is not easily available
B) defines several hundred transaction sets for various business forms
C) is not popular
D) defines only a transmission protocol
Question 44
By security in e-Commerce we mean. (i) Protecting an organization’s data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations.
A) i, ii
B) ii, iii
C) iii, iv
D) i, iii, iv
Question 45
A firewall is a ?
A) wall built to prevent fires from damaging a corporate intranet .
B) security device deployed at the boundary of a company to prevent unauthorized physical access .
C) security device deployed at the boundary of a corporate intranet to protect it from unauthorized
D) device to prevent all accesses from the internet to the corporate intranet .
Question 46
A firewall may be implemented in
A) Routers which connect intranet to internet
B) bridges used in an intranet
C) expensive modem
D) user’s application programs
Question 47
Firewall as part of a router program.
A) filters only packets coming from internet
B) filters only packets going to internet
C) filters packets travelling from and to the intranet from the internet
D) ensures rapid traffic of packets for speedy e-Commerce
Question 48
The Acronym DES stands for.
A) Digital Evaluation System
B) Digital Encryption Standard
C) Digital Encryption System
D) Double Encryption Standard
Question 49
DES works by using.
A) permutation and substitution on 64 bit blocks of plain text
B) only permutations on blocks of 128 bits
C) exclusive Oaring key bits with 64 bit blocks
D) 4 rounds of substitution on 64 bit blocks with 56 bit keys
Question 50
DES (i) is a symmetric key encryption method(ii) guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method
A) i and ii
B) ii and iii
C) i and iii
D) iii and iv
Question 51
DES using 56 bit keys
A) Cannot be broken in reasonable time using presently available computers
B) Can be broken only if the algorithm is known using even slow computers.
C) Can be broken with presently available high performance computers
D) It is impossible to break ever
Question 52
Triple DES uses.
A) 168 bit keys on 64-bit blocks of plain text
B) Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds
C) Works with 144 bit blocks of plain text and applies DES algorithm once.
D) Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.
Question 53
ripple DES
A) Cannot be broken in reasonable time using presently available computers
B) Can be broken only if the algorithm is known using even slow computer
C) Can be broken with presently available high performance computers.
D) It is impossible to break ever.
Question 54
Triple DES
A) is a symmetric key encryption method
B) guarantees excellent security
C) is implementable as a hardware VLSI chip
D) is public key encryption method with three keys.
Question 55
Public key encryption method is a system.
A) which uses a set of public keys one for each participant in e-Commerce
B) in which each person who wants to communicate has two keys; a private key known to him only and a
C) which uses the RSA coding system.
D) which is a standard for use in e-Commerce.
Question 56
Public key system is useful because.
A) it uses two keys.
B) there is no key distribution problem as public key can be kept in a commonly accessible database.
C) private key can be kept secret.
D) it is a symmetric key system.
Question 57
In public key encryption if A wants to send an encrypted message.
A) A encrypts message using his private key
B) A encrypts message using B’s private key
C) A encrypts message using B’s public key
D) A encrypts message using his public key
Question 58
What does IP mean ?
A) Instance Principle
B) Internet Protocol
C) Instant Protocol
D) Intellectual Property
Question 59
What happens to your data when it is encrypted ?
A) It is transferred to a third party, encoded, then sent back.
B) It is compressed, renamed, and archived.
C) It is sent through a series of supercomputers to be compressed multiple times.
D) It is recorded to retain privacy from third-parties
Question 60
What is a computer virus ?
A) A virus is the same as a cookie in that it is stored on your computer against your permission.
B) A virus is friendly software that is simply mislabeled.
C) Malicious software that merely stays dormant on your computer.
D) Malicious software that inserts itself into other programs
Question 61
Which of the following is valid difference between a Virus and a Spyware ?
A) Spyware damages data and also steals sensitive private information
B) Virus damages data, Spyware steals sensitive private information
C) Spyware damages data, Virus steals sensitive private information
D) Virus damages data and also steals sensitive private information
Question 62
How to avoid Man-in-the-middle attacks ?
A) Accept every SSL certificate, even the broken ones
B) Use connections without SSL
C) Use HTTPS connections and verify the SSL certificate
D) None of the above
Question 63
What happens during the TCP attack; Denial of Service ?
A) A virus is sent to disable their dos prompt.
B) Viruses are sent to their ISP to deny them tech support.
C) A worm is loaded onto the victim’s computer to disable their keyboard.
D) Information is repeatedly sent to the victim to consume their system resources, causing them to s
Question 64
What is Internet Protocol Security ?
A) Methods to secure Internet Protocol (IP) communication.
B) Ways to disconnect your router in an emergency
C) Methods to secure a disconnected computer.
D) Methods to secure your documents from physical breaches.
Question 65
Which of the following is a valid Cyber / Internet Security requirement ?
A) Authentication
B) Integrity
C) Confidentiality
D) All of the given options are correct
Question 66
Digital signatures provide which of the following ?
A) Authentication
B) Non-repudiation
C) Integrity protection
D) All of the given options are correct
Question 67
In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate ?
A) TCP
B) SHTTP
C) HTTPS
D) XHTTP
Question 68
कृत्रिम बुद्धिमत्ता ( Artificial Intelligence) क्या है ?
A) अपनी सोच कम्प्यूटर में रखना
B) अपनी बुद्धिमानी से की गई प्रोग्रामिंग
C) मशीन को बुद्धिमान बनाना
D) गेम खेलना
Question 69
निम्न उपकरणों में से कौन बुद्धिमत्ता ( Artificial Intelligence) में उपयोग किया जाता है ?
A) Art
B) Design
C) Input
D) Neural Network
Question 70
कृत्रिम बुद्धिमत्ता ( Artificial Intelligence) में शोध का मौलिक गोल है-
A) Reasoning
B) Coupling
C) Mastering
D) Data
Question 71
इनमें से कौन सा क्षेत्र के AI निकटतम है ?
A) Wiring
B) Drawing
C) Mathematics
D) French
Question 72
Cloud Computing के बारे में क्या चिंतनीय है ?
A) Too Expensive
B) Security Concerns
C) Too Many Platform
D) Accessibility
Question 73
इनमें से कौन सा क्लाउड कम्यूटिंग उपयोग का एक प्रमुख प्रकार नहीं है ?
A) Hardware
B) Platform
C) Software
D) Infrastructure
Question 74
Cloud Computing मैं Cloud का अर्थ है-
A) Wireless
B) Hard-drive
C) People
D) Internet
Question 75
क्लाउड कम्प्यूटिंग में निम्नलिखित कौन सा सबसे महत्वपूर्ण क्षेत्र है ?
A) Security
B) Storage
C) Scalability
D) All of these
Question 76
क्लाउड कम्प्यूटिंग के द्वारा………….से आप जानकारी तक पंहुच सकते हैं-
A) Your Desktop
B) Smart Phones
C) Video game Systems
D) All of the above
Question 77
क्लाउड कम्प्यूटिंग निकटतम है-
A) Peripherals
B) Web 2.0
C) Mainframes
D) None
Question 78
किस मॉडल में कलाकत्म प्रकार की सेवाएं शामिल हैं जिन्हे आप क्लाउड कम्प्यूटिंग प्लेटफॉर्म पर एक्सेस कर सकते हैं-
A) Service
B) Deployment
C) Application
D) None
Question 79
निम्न कौन सा मॉडल डेप्लॉयमेंट मॉडल है ?
A) Public
B) Private
C) Hybrid
D) All of these
Question 80
निम्नलिखित में से कौन सा मॉडल सर्वोत्तम सर्विस मॉडल के रूप में जाना जाता है ?
A) SaaS
B) IaaS
C) PaaS
D) All of these
Question 81
क्लाउड इंफ्रास्ट्रक्चर किसी संस्था के अनन्य उपयोग के लिए सांचालित होता है।
A) Public
B) Private
C) Community
D) All of these
Question 82
निम्नलिखित में से कौन क्लाउड सेवाओं को बेचने वाले संगठन के स्वामित्व में है ?
A) Public
B) Private
C) Community
D) Hybrid
Question 83
IOT किस पर बनाया गया है ?
A) डाटा एकत्र करने वाले सेंसर्स का नेटवर्क
B) क्लाउड कम्प्यूटिंग
C) a & b दोनों
D) इनमें से कोई नहीं
Question 84
Internet of Things का अविष्कार किसने किया था ?
A) बिल गेट्स
B) केविन एश्टन 1999
C) स्टीव जॉब्स
D) जॉन ब्रेड
Question 85
IIoT क्या है ?
A) Information Internet of Things
B) Industrial Internet of Things
C) Innovative Internet of Things
D) None of the above
Question 86
IoT Devices को संदर्भित( Referring) करने का अन्य तरीका है-
A) Connected
B) Smart
C) Both a & b
D) None of these
Question 87
Internet of Things से जुडी बनी संख्या में उपकरणों को स्वाचालित रूप से संवाद करना पड़ता है, मनुष्य के माध्यम से नहीं। इसे क्या कहा जाता है ?
A) Bot to Bot (B2B)
B) Machine to Machine (M2M)
C) Interclub
D) Sky net
Question 88
कौन क्षेत्र वर्चुअल रियलिटी द्वारा प्रभावित नहीं है ?
A) शिक्षा
B) सर्जरी
C) आक्रिटेक्चर
D) डाक सेवा
Question 89
Big Data शब्द को सबसे पहले किसने इस्तेमाल किया था ?
A) स्टीव जॉब्स
B) बिल गेट्स
C) जॉन मशी 1990
D) जॉन ब्रैडी
Question 90
Big Data का इस्तेमाल सबसे अधिक कहां होता है।
A) Information Management Specialist
B) Hackers
C) Innovation
D) Ethical Scientists
Question 91
RPA का पूर्ण अर्थ है।
A) Robot Process Automation
B) Robotic Process Automation
C) Robot Procedure Automation
D) None
Question 92
3D क्या कार्य करता है।
A) Computer graphics
B) Movies
C) Skulpchers
D) All of these
Question 93
Attacks on confidentiality is not a type of cyber attacks ?
A) True
B) False
Question 94
Phishing is the types of cyber security ?
A) True
B) False
Question 95
Firewall is a type of threat .
A) True
B) False
Question 96
Computer viruses are man made.
A) True
B) False
Question 97
Trend micro is a program.
A) True
B) False
Question 98
Encryption techniques improve a network's _______
A) Performance
B) Reliability
C) Security
D) None of the above ( NOTA )
Question 99
The certificate Authority signs the digital certificate with.
(A) User's public key
(B) User's Private Key
(C) It's own public key
(D) It's own Private key
Question 100
The number of users on a network has the greatest impact on the network's _______
A) Performance
B) Reliability
C) Security
D) None of the above ( NOTA )