Google News
logo
Cyber Security - Quiz(MCQ)
A)
Cyber Security provides security against malware
B)
Cyber Security protects a system from cyber attacks
C)
Cyber Security provides security against cyber-terrorists
D)
All of the Above

Correct Answer : Option (D) :   All of the Above


Explanation : Cyber Security is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

Source : F T L

A)
Robert
B)
Charles
C)
Bob Thomas
D)
August Kerckhoffs

Correct Answer : Option (D) :   August Kerckhoffs


Explanation : August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.

A)
Vint Cerf
B)
Bob Thomas
C)
Marcian Hoff
D)
Tim Berners-Lee

Correct Answer : Option (B) :   Bob Thomas


Explanation : The true birth of Cyber Security occurred in the 1970s. This began with a project called The Advanced Research Projects Agency Network (ARPANET). This was the connectivity network developed prior to the internet itself. A man named Bob Thomas determined it was possible for a computer program to move over a network.

A)
Stalking
B)
Bulling
C)
Phishing
D)
Identity theft

Correct Answer : Option (A) :   Stalking


Explanation :

In general, Stalking refers to continuous surveillance on the target (or person) done by a group of people or by the individual person.
 
Cyber Stalking is a type of cybercrime in which a person (or victim) is being followed continuously by another person or group of several people through electronic means to harass the victim. We can also say that the primary goal of Stalking is to observe or monitor each victim's actions to get the essential information that can be further used for threatening, harassing, etc.

A)
Cryptography
B)
Digital hacking
C)
Cyber attack
D)
Computer security

Correct Answer : Option (C) :   Cyber attack


Explanation : An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.

A)
Multipurpose Software
B)
Malicious Software
C)
Malfunctioned Software
D)
Malfunctioning of Security

Correct Answer : Option (C) :   Malicious Software


Explanation : Different types of harmful software and programs that can pose threats to a system, network or anything related to cyberspace are termed as Malware. Examples of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits etc.

A)
3
B)
4
C)
5
D)
6

Correct Answer : Option (B) :   4


Explanation : The 4 key elements that constitute the security are:

* confidentiality
* integrity
* authenticity
* availability

Authenticity is not considered as one of the key elements in some other security models, but the popular CIA Triad eliminates this as authenticity at times comes under confidentiality & availability.

A)
Physical Security
B)
Network Security
C)
Database Security
D)
Information Security

Correct Answer : Option (D) :   Information Security


Explanation : Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting valuable information for alteration, destruction, deletion or disclosure by unauthorised users.

A)
Dos Attack
B)
Soliciting
C)
Phishing
D)
None of the Above

Correct Answer : Option (A) :   Dos Attack


Explanation : A dos attack refers to the denial of service attack. It is a kind of cyber attack in which one tries to make a machine (or targeted application, website etc.) unavailable for its intended users. It is usually accomplished by disturbing the service temporarily or indefinitely of the target connected to the internet.

A)
Network Security
B)
Cloud Security
C)
Application Security
D)
All of the Above

Correct Answer : Option (D) :   All of the Above


Explanation :

Since technology is improving, the threat and attacks against the technology are also increasing. Hence, to provide security, it is divided into the following types:

Network Security : Protects the internal network from threats.

Cloud Security : Provides security for the data stored on the cloud.

Application Security : Protects data stored in the application software.