Cyber Security MCQ

Correct Answer : Option (D) :   All of the Above

Explanation : Cyber Security is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

Source : F T L

Correct Answer : Option (D) :   August Kerckhoffs

Explanation : August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.

Correct Answer : Option (B) :   Bob Thomas

Explanation : The true birth of Cyber Security occurred in the 1970s. This began with a project called The Advanced Research Projects Agency Network (ARPANET). This was the connectivity network developed prior to the internet itself. A man named Bob Thomas determined it was possible for a computer program to move over a network.

Correct Answer : Option (A) :   Stalking

Explanation :

In general, Stalking refers to continuous surveillance on the target (or person) done by a group of people or by the individual person.
Cyber Stalking is a type of cybercrime in which a person (or victim) is being followed continuously by another person or group of several people through electronic means to harass the victim. We can also say that the primary goal of Stalking is to observe or monitor each victim's actions to get the essential information that can be further used for threatening, harassing, etc.

Correct Answer : Option (C) :   Cyber attack

Explanation : An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.

Correct Answer : Option (C) :   Malicious Software

Explanation : Different types of harmful software and programs that can pose threats to a system, network or anything related to cyberspace are termed as Malware. Examples of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits etc.

Correct Answer : Option (B) :   4

Explanation : The 4 key elements that constitute the security are:

* confidentiality
* integrity
* authenticity
* availability

Authenticity is not considered as one of the key elements in some other security models, but the popular CIA Triad eliminates this as authenticity at times comes under confidentiality & availability.

Correct Answer : Option (D) :   Information Security

Explanation : Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting valuable information for alteration, destruction, deletion or disclosure by unauthorised users.

Correct Answer : Option (A) :   Dos Attack

Explanation : A dos attack refers to the denial of service attack. It is a kind of cyber attack in which one tries to make a machine (or targeted application, website etc.) unavailable for its intended users. It is usually accomplished by disturbing the service temporarily or indefinitely of the target connected to the internet.

Correct Answer : Option (D) :   All of the Above

Explanation :

Since technology is improving, the threat and attacks against the technology are also increasing. Hence, to provide security, it is divided into the following types:

Network Security : Protects the internal network from threats.

Cloud Security : Provides security for the data stored on the cloud.

Application Security : Protects data stored in the application software.