MCQ on Cyber Security | NIELIT CCC Plus

Advertisement

Q11. What is the primary goal of implementing security policies in an organization?
a) To improve employee productivity
b) To ensure compliance with legal requirements
c) To protect information and assets from security threats
d) To enhance user interface design

Show Answer

Correct Answer: c) To protect information and assets from security threats
Explanation: Security policies are designed to safeguard an organization’s information and assets from various security threats. They provide guidelines and procedures for managing security effectively.

Q12. Which security mechanism helps in verifying the identity of users?
a) Encryption
b) Authentication
c) Authorization
d) Backup

Show Answer

Correct Answer: b) Authentication
Explanation: Authentication is the process of verifying the identity of users before granting them access to systems or information. It ensures that only authorized individuals can access sensitive resources.

Q13. What is “malware”?
a) Software designed to perform specific tasks
b) Software that damages or disrupts systems
c) A type of firewall
d) A method of data encryption

Show Answer

Correct Answer: b) Software that damages or disrupts systems
Explanation: Malware refers to malicious software designed to damage, disrupt, or gain unauthorized access to systems. It includes various types such as viruses, worms, and Trojan horses.

Q14. What should you look for in a URL to determine if a website is secure?
a) The presence of a green address bar
b) The website’s loading speed
c) The use of HTTPS in the URL
d) The website’s color scheme

Show Answer

Correct Answer: c) The use of HTTPS in the URL
Explanation: A secure website will use HTTPS in its URL, indicating that data transmitted between the user and the site is encrypted. The presence of HTTPS helps to protect against eavesdropping and tampering.

Q15. What does a firewall do in network security?
a) Monitors and filters incoming and outgoing network traffic
b) Encrypts data for secure transmission
c) Scans for viruses and malware
d) Manages user access permissions

Show Answer

Correct Answer: a) Monitors and filters incoming and outgoing network traffic
Explanation: A firewall monitors and controls network traffic based on predetermined security rules. It helps to block unauthorized access and potential threats while allowing legitimate communication.

Q16. What is the purpose of creating a strong password?
a) To make it easier to remember
b) To improve system performance
c) To prevent unauthorized access to accounts
d) To increase internet speed

Show Answer

Correct Answer: c) To prevent unauthorized access to accounts
Explanation: A strong password helps to protect accounts from unauthorized access by making it difficult for attackers to guess or crack. It should be complex and unique to enhance security.

Q17. What is a “Trojan horse”?
a) A type of hardware security device
b) A malicious program disguised as legitimate software
c) A tool for network monitoring
d) A method for data encryption

Show Answer

Correct Answer: b) A malicious program disguised as legitimate software
Explanation: A Trojan horse is a type of malware that appears to be legitimate software but secretly performs harmful actions once installed on a system. It often misleads users into installing it.

Q18. What does “confidentiality” in cybersecurity refer to?
a) Ensuring data accuracy
b) Protecting data from unauthorized access
c) Making data available when needed
d) Verifying the identity of users

Show Answer

Correct Answer: b) Protecting data from unauthorized access
Explanation: Confidentiality involves safeguarding information from unauthorized access or disclosure. It ensures that sensitive data is only accessible to individuals who have the necessary permissions.

Q19. What is the primary function of antivirus software?
a) To manage network traffic
b) To scan and remove malicious software
c) To create strong passwords
d) To encrypt data

Show Answer

Correct Answer: b) To scan and remove malicious software
Explanation: Antivirus software is designed to detect, prevent, and remove malicious software such as viruses, worms, and Trojans. It helps protect systems from security threats.

Q20. How can you recognize a phishing attempt?
a) It comes from a known sender
b) It requests personal information or credentials
c) It is well-written and professional
d) It includes an attachment

Show Answer

Correct Answer: b) It requests personal information or credentials
Explanation: Phishing attempts often request sensitive information or credentials from the recipient under false pretenses. Being cautious with unsolicited requests for personal details can help identify phishing.

Advertisement
error: Content is protected !!
Scroll to Top