Q.1
What is Cyber Security?
  • a) Cyber Security provides security against malware
  • b) Cyber Security provides security against cyber-terrorists
  • c) Cyber Security protects a system from cyber attacks
  • d) All of the mentioned
Q.2
What does cyber security protect?
  • a) Cyber security protects criminals
  • b) Cyber security protects internet-connected systems
  • c) Cyber security protects hackers
  • d) None of the mentioned
Q.3
Who is the father of computer security?
  • a) August Kerckhoffs
  • b) Bob Thomas
  • c) Robert
  • d) Charles
Q.4
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
  • a) Cyber attack
  • b) Computer security
  • c) Cryptography
  • d) Digital hacking
Q.5
Which of the following is a type of cyber security?
  • a) Cloud Security
  • b) Network Security
  • c) Application Security
  • d) All of the above
Q.6
What are the features of cyber security?
  • a) Compliance
  • b) Defense against internal threats
  • c) Threat Prevention
  • d) All of the above
Q.7
Which of the following is an objective of network security?
  • a) Confidentiality
  • b) Integrity
  • c) Availability
  • d) All of the above
Q.8
Which of the following is not a cybercrime?
  • a) Denial of Service
  • b) Man in the Middle
  • c) Malware
  • d) AES
Q.9
Which of the following is a component of cyber security?
  • a) Internet Of Things
  • b) AI
  • c) Database
  • d) Attacks
Q.10
Which of the following is a type of cyber attack?
  • a) Phishing
  • b) SQL Injections
  • c) Password Attack
  • d) All of the above
Q.11
Which of the following is not an advantage of cyber security?
  • a) Makes the system slower
  • b) Minimizes computer freezing and crashes
  • c) Gives privacy to users
  • d) Protects system against viruses
Q.12
“Cyberspace” was coined by _________
  • a) Richard Stallman
  • b) William Gibson
  • c) Andrew Tannenbaum
  • d) Scott Fahlman
Q.13
In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
  • a) 1991
  • b) 1983
  • c) 1970
  • d) 1964
Q.14
Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
  • a) Nation / State sponsored hackers
  • b) CIA triad
  • c) Special Hackers
  • d) Government Hackers
Q.15
Which of the following act violates cyber security?
  • a) Exploit
  • b) Attack
  • c) Threat
  • d) Vulnerability
Q.16
Which of the following actions compromise cyber security?
  • a) Vulnerability
  • b) Attack
  • c) Threat
  • d) Exploit
Q.17
Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
  • a) Pharming
  • b) Website-Duplication
  • c) Mimicking
  • d) Spamming
Q.18
Which of the following is not a type of peer-to-peer cyber-crime?
  • a) MiTM
  • b) Injecting Trojans to a target victim
  • c) Credit card details leak in the deep web
  • d) Phishing
Q.19
A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
  • a) Clickjacking
  • b) Buffer-overflow
  • c) Phishing
  • d) MiTM
Q.20
Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
  • a) ip tracker
  • b) emails
  • c) websites
  • d) web pages
0 h : 0 m : 1 s