MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
1000 Cyber Security
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
Q.2
What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
Q.3
Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
Q.4
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
Q.5
Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
Q.6
What are the features of cyber security?
a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above
Q.7
Which of the following is an objective of network security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
Q.8
Which of the following is not a cybercrime?
a) Denial of Service
b) Man in the Middle
c) Malware
d) AES
Q.9
Which of the following is a component of cyber security?
a) Internet Of Things
b) AI
c) Database
d) Attacks
Q.10
Which of the following is a type of cyber attack?
a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
Q.11
Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses
Q.12
“Cyberspace” was coined by _________
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
Q.13
In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
a) 1991
b) 1983
c) 1970
d) 1964
Q.14
Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
Q.15
Which of the following act violates cyber security?
a) Exploit
b) Attack
c) Threat
d) Vulnerability
Q.16
Which of the following actions compromise cyber security?
a) Vulnerability
b) Attack
c) Threat
d) Exploit
Q.17
Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming
Q.18
Which of the following is not a type of peer-to-peer cyber-crime?
a) MiTM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing
Q.19
A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM
Q.20
Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
a) ip tracker
b) emails
c) websites
d) web pages
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page