Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
279 views4 pages

Unit - 1 CS MCQ

Uploaded by

Gybc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
279 views4 pages

Unit - 1 CS MCQ

Uploaded by

Gybc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
tniroduction t0 Cyber Security 12. Why is Cybersecurity Important 2 13, What is the importance of cyber security ? 14, What are the goals of Cyber Security » ; 15, What is the CIA Triad 16, What are the Issues Cyber Security and challenges of cyber security ? y? MCQs Question Son 17, How is automation used in eybersecurit 1, What is Cyber Security 2 a) Cyber Security provides Security against malware b) Cyber Security provides securi c) Cyber Security protects a g d) All of these ity against cyber-terrorists ystem from cyber attacks 2. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? a) Cyber attack b) Computer security ©) Cryptography 4) Digital hacking 3. Which of the following is a type of cyber security? a) Cloud Security b) Network Security c) Application Security d) All of the above 4. Which of the following is not a cybercrime? a) Denial of Service b) Man in the Middle c) Malware 4) AES 5. Which of the following is a type of cyber attack ? a) Phishing b) SQL Injections c) Password Attack d) All of the above 6. “Cyberspace” was coined by a) Richard Stallman b) William Gibson c) Andrew Tannenbaum d) Scott Fahiman 7. The Inventor of the World Wide Web is _. a) Marks Zuckerberg b) Bill Gates c) Tim Berners-Lee d) John McCarthy 47 Sri Siddalingeshwara Prakashana Sti Siddalingeshwara Prakashana ri Si Bi @ scanned with OKEN Scanner Introdueyi re : wuew? What is World Wide Web ? ee computer networks, ‘ ‘Accollection of interconnected computer i" a) ed for accessing online content, veb browser used a _ 3 A callection of websites and web pages accessible over thy iter, ° ‘A software application for browsing the internet, 9, The standard internet protocol is UDF : a 4) WWW . : 10. Which of these is NOT involved in the ou Trad 2 i . ali vailability tial ut 2 mes }) Autentcty ¢ “LL. Which of the following is not a type of cyber security 2 a. Data Security b. Network Security c. System Security d. None of these 12. HTTP Stand for a. Hypertext Transfer Protocol b. Hyper Text Transfer Poin c. Higher Text Transfer Protocol 4. High Text Transfer Poin 13. Which of the following is not front-end technology ? a. HTML b. CSS ©. Bootstrap d. None of these 14. ISOC stand for a Internet Secure Operation Control b. Internet Society ¢. Internet Securely Operatable Control d, None of these 15. ARPANET Full form Advanced Resolution Projects Agency Network Address Resolution Packet and Network Encryption Transfer Advanced Research Projects Agency Network None of these 16. Which of the follo aoge wing is NOT a common cyber threat ? a) Malware b) Phishing ¢) Firewalls d) Ransomware 17. What is Social engineering 7 ° The use of technology to Sain unauthorized access to computer syst" ) The process of manipulat gee foe i jon of "8 individuals to reveal sensitive informatl Perform actions, al ge Sti Siddalingeshwara Prakashana 48 Siddatingeshwara F™ Sri Siddall @ scanned with OKEN Scanner FS SSS SEE CEE EE EEE ee ae a ee eee eee ee eee introduction t0 Cyber Security Cyber Security 20. 2. 23. 26. Sti Siddalingeshwara Prakashana of enerypting data to protect it from unauthorized access. d) The process of analyzing network traffic to detect and prevent attacks Which of the following is an example of a strong authentication factor ? a) Using a single password, b) Using a fingerprint or facial recognition, ¢) Using a generic username. @) Using a publicly available password. . Which of the following is not a web technology ? a) HTML b) Java ©) css 4) PHP Which technology is used for styling web pages ? a) HTML b) CSS ©) XML d) JavaScript Which technology is used for communication between web browsers and servers ? a) HTML b) Css c) XML d) HTTP . Which technology is used for creating dynamic web pages ? a) HTML b) CSS c) PHP @) XML The architecture of cyberspace refers to: a) The physical infrastructure of the internet b) The layout and design of websites cc) The structure and organization of information in virtual spaces d) The security protocols used to protect online data |. Which of the following is an example of an Internet governance organization ? a) ICANN b) IEEE c) NSA d) FIFA . What is a common type of malware ? a) Firewall b) Router ©) Virus 4) Encryption What does the term “phishing” refer to in cyber security ? a) Stealing sensitive information through email or fake websites b) Denying access to a network or system by flooding it with traffic c) Modifying or tampering with data in order to disrupt operations 4) Exposing vulnerabilities in computer systems 49 Sri Siddalingeshwara Prakashana @ scanned with OKEN Scanner Cyber Security What is the purpose of firewall a) Protecting against viruses and malware b) Preventing unauthorized access to a network or system c) Encrypting sensitive data @) Monitoring and analyzing network traffic What is a denial-of-service (DoS) attack ? 28. a) Gaining unauthorized access to a system or network b) Flooding a network or system with traffic to make it unavailapy c) Encrypting sensitive data to prevent unauthorized access f 4) Manipulating people to disclose sensitive information 29, What is the purpose of regular software updates and patches ? a) Enhancing system performance b) Adding new features to software c) Fixing security vulnerabilities and bugs 4) Making software compatible with other programs 30. What is inulti-factor authentication ? a) Authenticating a user based on a single factor, such as a password b) Authemticating a user based on multiple factors, such as a password sx fingerprint : c) Authenticating a user based on biometric data, such as a retina scan 4) Authenticating a user based on their IP address MCQs Answers 1 > eee ee (ee ed eee ee ee 8 | 9 | » p[a|op Dejebjec Cel agp n/}2| o| 4{sf 6 | 7] wi | » Dias eDe ee Ce cre B | B |B au | 2 | 2] m2 | 2% | 2 | 2] » |» D c c Ate A B B Cees oo¢ ns < Sri Siddalingeshwara Prakashana i Sri siddalingest™2™? f et @ scanned with OKEN Scanner

You might also like