Cyber security MCQ with answers pdf. Computer IT security related most important Questions and answers for all competitive exams & interview. All these MCQs asked in previous year exam papers.
Cyber Security MCQ with Answers PDF
1.What is the full form of LDAP?
A Light Weight Directory Access Provider
B Light Weight Directory Access Protocol
C Light Weight Directory Access Program
D Light Weight Directory Access Protection
Ans. b
2.What is called the collective terms of malicious software, such as viruses, worms and trojans?
A Spam
B Phishing
C Malware
D Harm
Ans. c
3. What is the full form of CIA under information security?
A Confidentiality Integrity Availability
B Criminal Investigation Agency
C Cost Information Agency
D Credit Integrity Assessment
Ans. a
4.What is called periodic assessment of security vulnerability in computer system?
A Threat
B Attack
C Hacking
D Security audit
Ans. d
5.What is called a single point of access for several networking services?
A Phishing
B Web service
C Directory service
D Worms
Ans. c
6.Which activities endanger the sovereignty and integrity of nation?
A Cyber Terrorism
B Cyber vandalism
C Cyber squatting
D Carding
Ans. a
7. Which crime involves the use of computer networks to create, distribute or access materials tha sexually expoit underage persons?
A Assault by Threat
B Cyber squatting
C Cyber vandalism
D Child pornography
Ans. d
8.Which method go through all the files or network elements with an intention to detect something unusual?
A Probing
B Phishing
C Infecting
D Scanning
Ans. d
9. Victims of cyber attack might loose _______.
(a) data
(b) money
(c) both a & b
(d) none of them
Ans. c
10. Under information security, any device having _______is classified as a computing device.
(a) processor
(b) memory
(c) both a & b
(d) neither a nor b
Ans. c
11. Under information security, CIA stands for _______.
(a) Criminal Investigation Agency
(b) Confidentiality, Integrity, Availability
(c) Cost Information Agency
(d) Credit Integrity Assessment
Ans. b
12. Script files sent mostly through email attachment to attack host computer are called ______.
(a) Worms
(b) Phishing attacks
(c) Trojans
(d) Computer Viruses
Ans. a
13. Attacking the victims through fake URL resembling that of a valid financial Institution
is called_____ .
(a) Worms
(b) Phishing attack
(c) Trojans
(d) Computer Viruses
Ans. b
14. Getting the user ID and password from avictim through dubious program is called _____attack.
(a) Worms
(b) Phishing attack
(c) Trojan
(d) Computer Viruses
Ans. c
15. A malicious program spreading through internet and storage media and attacking the data in victims computer is called_______.
(a) Worms
(b) Phishing attack
(c) Trojan
(d) Computer Virus
Ans. d
16. Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.
(a) strength
(b) antivirus
(c) vulnerability
(d) port
Ans. c
17. Vulnerability for cyber attack may be in______.
(a) operating system
(b) application software
(c) IT infrastructure
(d) all of them
Ans. d
18. To protect the network infrastructure from vulnerability, _____ is setup.
(a) firewall
(b) Internet security software
(c) both a & b
(d) none of them
Ans. c
19. The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim is called ______ .
(a) hacker
(b) cracker
(c) maker
(d) taker
Ans. a
20. Periodic assessment of security vulnerability in computer systems is called _______audit.
(a) threat
(b) attack
(c) hacking
(d) security
Ans. d
21. The security audit team______ to keep the computers safe from cyber attacks.
(a) assesses vulnerability
(b) decides the safety measures through hardware and software
(c) considers latest threat scenario and implements information safety
(d) all of them
Ans. d
22. To ensure information safety, ________should be implemented.
(a) physical access security
(b) password access security
(c) secure IT infrastructure
(d) all of them
Ans. d
23. A single point of access for several networking services is called _____.
(a) Directory Service
(b) web server
(c) email server
(d) none of them
Ans. a
24. Directory service permits security administrators to ______.
(a) concentrate on security of directory service instead of individual machines
(b) create new vulnerabilities
(c) damage the security of computers
(d) create new virus
Ans. a
25. Directory service should be able to _______in the infrastructure.
(a) include new services
(b) esaily search for information in the network
(c) the information stored on the directory server should be accessible from any operating system
(d) all of them
Ans. d
26. LDAP in directory service stands for ______.
(a) Light Weight Director Access Provider
(b) Light Weight Director Access Protocol
(c) Light Weight Director Access Provider
(d) Light Weight Director Access Protection
Ans. b
27. Protecting access to a computer through________ is called access control.
(a) physical restriction of entry
(b) password security for login
(c) both a & b
(d) none of them
Ans. c
28. Security should be implemented at the stage of ______in software.
(a) development stage
(b) entire life cycle
(c) Sofware Development Life Cycle (SDLC)
(d) all of them
Ans. d
29. SDLC in software development stands for _____.
(a) Software Development Life Circus
(b) Software Development Life Cycle
(c) Software Drafting Life Cycle
(d) Software Development Lead Cycle
Ans. b
30. Protection from______ of source code means non-disclosure of the source code to outsiders.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. a
31. Protection from ______of source code means alloting the right to edit the source code to authorized persons only.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. b
32. Protection from _______of source code means protection of any individual from destroying the software source code.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. c
33. Protection from ________of source code means recording all changes made to the source code and the person making such changes.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. d
32. _______of access rights in source code development means verification of role before permitting access to source code.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. a
33. _____in source code development means verification of role before permitting access to source code.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. b
34. _____in source code development means handling of configuration errors, session errors and exceptions.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. c
35. Protecting the data divulged by customers from unauthorized access is called____.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans a
36. Information on criminal records of individuals, financial data of companies, genetic information, address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of debit card, netbanking details, etc. are classified under ______.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans. a
37. Information security audit may be conducted with reference to _____ .
(a) vulnerabilities
(b) threats
(c) preventive measures
(d) all of them
Ans. d
38. Information security audit analyses events of past threats to formulate _____.
(a) security measures
(b) safe practices
(c) software protection
(d) all of them
Ans. d
39. Any single employee ______hold all data needed for making a complete financial transaction.
(a) should not
(b) should
(c) may
(d) might
Ans. a
40. IT audit of the firm should be conducted periodically, which may be every______ .
(a) fortnight
(b) month
(c) quarter
(d) all of them
Ans. d