0 ratings0% found this document useful (0 votes) 279 views4 pagesUnit - 1 CS MCQ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
tniroduction t0 Cyber Security
12. Why is Cybersecurity Important 2
13, What is the importance of cyber security ?
14, What are the goals of Cyber Security » ;
15, What is the CIA Triad
16, What are the Issues
Cyber Security
and challenges of cyber security ?
y?
MCQs Question
Son
17, How is automation used in eybersecurit
1, What is Cyber Security 2
a) Cyber Security provides Security against malware
b) Cyber Security provides securi
c) Cyber Security protects a g
d) All of these
ity against cyber-terrorists
ystem from cyber attacks
2. Which of the following is defined as an attempt to steal, spy, damage or destroy
computer systems, networks, or their associated information?
a) Cyber attack b) Computer security
©) Cryptography 4) Digital hacking
3. Which of the following is a type of cyber security?
a) Cloud Security b) Network Security
c) Application Security d) All of the above
4. Which of the following is not a cybercrime?
a) Denial of Service b) Man in the Middle
c) Malware 4) AES
5. Which of the following is a type of cyber attack ?
a) Phishing b) SQL Injections
c) Password Attack d) All of the above
6. “Cyberspace” was coined by
a) Richard Stallman b) William Gibson
c) Andrew Tannenbaum d) Scott Fahiman
7. The Inventor of the World Wide Web is _.
a) Marks Zuckerberg b) Bill Gates
c) Tim Berners-Lee d) John McCarthy
47
Sri Siddalingeshwara Prakashana
Sti Siddalingeshwara Prakashana ri Si Bi
@ scanned with OKEN ScannerIntrodueyi
re
: wuew?
What is World Wide Web ? ee
computer networks,
‘ ‘Accollection of interconnected computer i"
a) ed for accessing online content,
veb browser used a _
3 A callection of websites and web pages accessible over thy iter,
° ‘A software application for browsing the internet,
9, The standard internet protocol is UDF
: a 4) WWW
. :
10. Which of these is NOT involved in the ou Trad 2 i
. ali vailability
tial ut
2 mes }) Autentcty
¢
“LL. Which of the following is not a type of cyber security 2
a. Data Security b. Network Security
c. System Security d. None of these
12. HTTP Stand for
a. Hypertext Transfer Protocol b. Hyper Text Transfer Poin
c. Higher Text Transfer Protocol 4. High Text Transfer Poin
13. Which of the following is not front-end technology ?
a. HTML b. CSS
©. Bootstrap d. None of these
14. ISOC stand for
a Internet Secure Operation Control b. Internet Society
¢. Internet Securely Operatable Control d, None of these
15. ARPANET Full form
Advanced Resolution Projects Agency Network
Address Resolution Packet and Network Encryption Transfer
Advanced Research Projects Agency Network
None of these
16. Which of the follo
aoge
wing is NOT a common cyber threat ?
a) Malware b) Phishing
¢) Firewalls d) Ransomware
17. What is Social
engineering 7
° The use of technology to Sain unauthorized access to computer syst"
) The process of manipulat
gee foe i jon of
"8 individuals to reveal sensitive informatl
Perform actions, al ge
Sti Siddalingeshwara Prakashana 48 Siddatingeshwara F™
Sri Siddall
@ scanned with OKEN ScannerFS SSS SEE CEE EE EEE ee ae a ee eee eee ee eee
introduction t0 Cyber Security Cyber Security
20.
2.
23.
26.
Sti Siddalingeshwara Prakashana
of enerypting data to protect it from unauthorized access.
d) The process of analyzing network traffic to detect and prevent attacks
Which of the following is an example of a strong authentication factor ?
a) Using a single password,
b) Using a fingerprint or facial recognition,
¢) Using a generic username.
@) Using a publicly available password.
. Which of the following is not a web technology ?
a) HTML b) Java
©) css 4) PHP
Which technology is used for styling web pages ?
a) HTML b) CSS
©) XML d) JavaScript
Which technology is used for communication between web browsers and servers ?
a) HTML b) Css
c) XML d) HTTP
. Which technology is used for creating dynamic web pages ?
a) HTML b) CSS
c) PHP @) XML
The architecture of cyberspace refers to:
a) The physical infrastructure of the internet
b) The layout and design of websites
cc) The structure and organization of information in virtual spaces
d) The security protocols used to protect online data
|. Which of the following is an example of an Internet governance organization ?
a) ICANN b) IEEE
c) NSA d) FIFA
. What is a common type of malware ?
a) Firewall b) Router
©) Virus 4) Encryption
What does the term “phishing” refer to in cyber security ?
a) Stealing sensitive information through email or fake websites
b) Denying access to a network or system by flooding it with traffic
c) Modifying or tampering with data in order to disrupt operations
4) Exposing vulnerabilities in computer systems
49
Sri Siddalingeshwara Prakashana
@ scanned with OKEN ScannerCyber Security
What is the purpose of
firewall
a) Protecting against viruses and malware
b) Preventing unauthorized access to a network or system
c) Encrypting sensitive data
@) Monitoring and analyzing network traffic
What is a denial-of-service (DoS) attack ?
28.
a) Gaining unauthorized access to a system or network
b) Flooding a network or system with traffic to make it unavailapy
c) Encrypting sensitive data to prevent unauthorized access f
4) Manipulating people to disclose sensitive information
29, What is the purpose of regular software updates and patches ?
a) Enhancing system performance
b) Adding new features to software
c) Fixing security vulnerabilities and bugs
4) Making software compatible with other programs
30. What is inulti-factor authentication ?
a) Authenticating a user based on a single factor, such as a password
b) Authemticating a user based on multiple factors, such as a password sx
fingerprint :
c) Authenticating a user based on biometric data, such as a retina scan
4) Authenticating a user based on their IP address
MCQs Answers
1 > eee ee (ee ed eee ee ee 8 | 9 | »
p[a|op Dejebjec Cel agp
n/}2| o| 4{sf 6 | 7] wi | »
Dias eDe ee Ce cre B | B |B
au | 2 | 2] m2 | 2% | 2 | 2] » |»
D c c Ate A B B Cees
oo¢
ns <
Sri Siddalingeshwara Prakashana i Sri siddalingest™2™? f
et
@ scanned with OKEN Scanner