The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from hostile intrusions is known as cyber security. Today, someone can send or receive any source of data, whether it’s videos, or mail, in just one click, but has he ever wondered how secure this information is conveyed to another person with no data leakage? Cybersecurity is the appropriate answer. Today more than 61% of full industry exchanges are done on the internet, so this for the area is a prerequisite for high-quality security for direct and best exchanges. Thus, cybersecurity has become the most recent issue (Dervojeda et al., 2014). More than two-thirds of whole market transactions are now conducted through online mode, demanding a degree of security for straight and best transactions in this field. As a result, cybersecurity has recently become a major topic.
Multiple Choice Questions(MCQ)
1. Cyber Security provide security against what?
-
- Against Malware
- Against cyber-terrorists
- Defends a device from threat.
- All mentioned options
Answer: D
2. Who is popularly known as the father of cyber security?
-
- Robert
- August Kerckhoffs
- Bob Thomas
- Charles
Answer: B
3. Which of the below is a kind of cyber security?
-
- Cloud Security
- Application Security
- Cloud Security
- All options mentioned above
Answer: D
4. Which of the below does not constitute a cybercrime?
-
- refusal of service
- Man in the middle
- Phishing
- AES
Answer: D (AES stands for Advanced Encryption Standard) safeguards data by encoding it)
5. Which of the below benefits of cyber security is not true?
-
- System getting slower
- Computer lagging and crashes
- provide privacy to users
- Secures system against viruses
Answer: A
6. Who coined the term “ Cyberspace”?
-
- William Gibson
- Andrew Tannenbaum
- Scott Fahlman
- Richard Stallman
Answer: A
7. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?
-
- Pharming
- Mimicking
- Spamming
- Website-Duplication
Answer: A ( Pharming is a method and technique used by cybercriminals to deceive people by creating fake websites and domains)
8. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
-
- emails
- websites
- IP tracer
- web pages
Answer: B
9. Which of the below does not qualify as a form of peer-to-peer cybercrime?
-
- Trojans are implanted into a targeted device.
- On the deep web, payment information is leaked.
- mm
- Phishing
Answer: B
10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below?
-
- Digital crime
- Threats
- System hijacking
- Cyber Attack
Answer: D
11. Any company or agency’s IT protection is managed and maintained by?
-
- Software Security Specialist
- CEO of the organisation
- Security Auditor
- IT Security Engineer
Answer: D ( This is a profession in which a professional develops and maintains various systems and security devices for the firm or organisation)
12. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by cybercriminals?
-
- MiTM attack
- Phishing attack
- Website attack
- DoS attack
Answer: B
13. Which of the below security encryption standards is the weakest?
-
- WPA3
- WPA2
- WPA
- WEP
Answer: D ( WEP stands for wired Equivalent Privacy. It is a most insecure encrypted protocol)
14. Which of the below measures can help reduce the risk of data leakage?
-
- Steganography
- Chorography
- Cryptography
- Authentication
Answer: A ( Steganography functions as concealing information in a non-suspicious manner)
15. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?
-
- Confidentiality
- Non-repudiation
- CIA Triad
- Authenticity
Answer: C (CIA Triad is the most popular and frequently used approach, focusing on the confidentiality of information)
16. ___________ means the security of data from tampering by unidentified users.
-
- Confidentiality
- Integrity
- Authentication
- Non-repudiation
Answer: B
17. Which of the below implemented is not a good means of safeguarding privacy?
-
- Biometric verification
- ID and password-based verification
- 2-factor authentication
- switching off the phone
Answer: D
18. When ____ and ____ are in charge of data, the integrity of the data is imperilled?
-
- Access control, file deletion
- Network, file permission
- Access control, file permission
- Network, system
Answer: C
19. The authenticity and security of data travelling over a network are ensured by?
-
- Firewall
- Antivirus
- Pentesting Tools
- Network-security protocols
Answer: D ( Network-security protocols govern the procedures and processes used to protect network data against illegal content collection)
20. _________ creates an isolated passage across a public network that enables computing devices to communicate and receive data discreetly as though they were directly linked to the private network.
-
- Visual Private Network
- Virtual Protocol Network
- Virtual Protocol Networking
- Virtual Private Network
Answer: D
21. ___________ is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user data.
-
- Fedora
- Tails
- Ubuntu
- OpenSUSE
Answer: B
22. What is a single entrance for multiple connectivities called?
-
- Web services
- phishing
- Directory service
- worms
Answer: C (A directory service is the following system of software and protocols that keep track of knowledge about the company, clients, or sometimes both)
23. Circuit-level gateway firewalls have which of the below disadvantages?
-
- They’re expensive
- They’re complex in architecture
- They do not filter individual packets
- They’re complex to setup
Answer: C
24. The initial phase of ethical hacking is?
-
- DNS poisoning
- Footprinting
- ARP-poisoning
- Enumeration
Answer: B ( In this Phase, The attacker attempts to find as many attack vectors as he can, reconnaissance is another term for footprinting)
25. Which of the below can be classified as a type of computer threat?
-
- Dos Attack
- Phishing
- Soliciting
- Both A and C
Answer: A ( A denial of service attack is referred to as a dos attack, it’s a type of cyber-attack in which someone tries to prevent a machine from serving its intended consumers)
26. In system hacking, which of the below is the most crucial activity?
-
- Information gathering
- Covering tracks
- Cracking passwords
- None of the above
Answer: C
27. When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?
-
- Reliability
- Performance
- Security
- Longevity
Answer: D
28. Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?
-
- Open-design
- The economy of the Mechanism
- Least privilege
- Fail-safe Defaults
Answer: B
29. Which of the below malware types permits the hackers to access administrative controls and do nearly everything he wants with the infected systems?
-
- RATs
- Worms
- Rootkits
- Botnets
Answer: A ( RATs stands for Remote Access Trojans which gives the attacker administrative power over your device, just as if they had physical access)
30. The first hacker’s conference was held in which of the below locations?
-
- OSCON
- DEVON
- DEFCON
- SECTION
Answer: C ( DEFCON is one of the most well-known and biggest hackers and security consultant conferences in the world. It’s often conducted in Las Vegas, Nevada, once a year)
31. When any IT device, service, or system requires security checks, the term “security testing” is employed.?
-
- Threat
- Vulnerability
- Objective of evaluation
- Attack
Answer: C ( When any IT system, device, or platform requires assessment for safety purposes or to address any faults after being evaluated by security researchers, the term “objective of evaluation” is used)
32. Which of the below is used to analyse network flow and monitor traffic?
-
- Managed detection and response
- Cloud access security broker
- Network traffic analysis
- Network traffic analysis
Answer: C
33. Which of the below is a method of gaining access to a computer program or an entire computer system while circumventing all security measures?
-
- Backdoor
- Masquerading
- Phishing
- Trojan Horse
Answer: Backdoor ( A backdoor is a sort of malware that bypasses standard authentication mechanisms to gain access to a system)
34. The term “protection from ______of source code” refers to limiting access to the source code to just authorised individuals.
-
- disclosure
- alteration
- destruction
- log of changes
Answer: C
35. _______________ are programmes or procedures that enable hackers to maintain control of a computer system.?
-
- Exploits
- Antivirus
- Firewall by-passers
- Worms
Answer: A ( Exploits are programs or algorithms that allow hackers to gain total control of a computer system)