MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Information Security
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
What is software?
Viruses on your computer
Programs used by a computer
Documents used to type information on
Harmful information
Q.2
What is a firewall?
A wall made of fire in your computer to make sure your computer is heated up and running properly.
A software used to attack other security measures in your computer to insure your computer is safe.
A filter that filters incoming data, protecting a network from attacks.
Q.3
What is Cyber security?
All the tools we use and actions we take to keep computers safe.
Protecting your computer against hackers
Being secure against cyber bots
Q.4
What is malware?
Hackers trying to hack your computer.
Term for any software that is designed to harm or do illegal activities.
Term for cookies trying to invade your computer and implement viruses.
Q.5
What is a Trojan Horse?
A big wooden horse used to attack Troy in ancient Greece.
A program with hidden malicious functions.
A program that tricks your computer and destroys it with the power of Social engineering.
Q.6
What is a worm?
A worm you see outside in the dirt.
A software used to worm into your computer.
Malware that can infect and spread without human assistance.
Q.7
What is netiquette?
A term used to describe network attacks.
A malware that pretends to have ethical standards but attacks you when you least suspect it.
The term for commonly accepted rules of how to behave online.
Q.8
Which of the following is a true statement?
Updated antimalware programs always find the latest threats on a system.
Opening e-mail attachments is a common attack vector for malware.
USB drives are no longer vulnerable to malware infection.
Heuristic analysis of systems can find only previously known viruses or threats.
Q.9
What are loT devices?
Anything that is connected to the internet.
Smartphones, smart lightning, and connected speakers.
Devices that need a special key to unlock them.
Devices that require security procedures in order to keep them as uncompromised as possible, ex: Government computers.
Q.10
What does BIOS stand for?
It doesn't stand for anything
Basic Input Output System
Boots In One Second
Basically, I'm the Origin of the System
Q.11
What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-Logging
De-anonymization by network operators
Phishing attacks
Q.12
What is spyware?
Malware that collects information about you without your consent or knowledge.
A program that looks through you laptop camera and allows your FBI Agent to see you.
A program that allows you to become a better spy and gives you tools to spy on your friends.
Q.13
Which of the following statements is true of defenders of belief?
Their communities do not facilitate activities like sales and marketing.
They seek conformity and want to convince others of the wisdom of their opinions.
They are effective for activities that involve innovation and problem solving.
When confronted with contrary evidence, they change their opinion.
Q.14
What does compliance mean?
providing secure access to user data
using honest means to bypass security measures
conducting tests to identify vulnerabilities in a system
following the rules or standards that have been established
Q.15
A cookie that remains until an expiration date is met is:
session cookie
secure cookie
persistent cookie
super cookie
Q.16
What does a Trojan Horse do?
Makes the computer stop working
Attaches inside of program
Gets full access
Gets full access
Q.17
Self-replicating malware is known as a ____.
rootkit
worm
macro virus
logic bomb
Q.18
A(n) ____ is a device that captures phone numbers and related information on outgoing phone calls.
ECPA
pen register
keylogger
Trojan horse
Q.19
Which of the following four passwords is the most secure?
Boat123
WTh!5Z
into*48
123456
Q.20
What damage can be caused by malware?
Computer crashes
The compromising personal information, which may lead to identity theft
Permanent deletion
All of the above
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page