MCQ on Cyber Security | NIELIT CCC Plus

Advertisement

Q31. What is the primary purpose of encryption?
a) To manage network traffic
b) To protect data by converting it into a secure format
c) To monitor system performance
d) To create strong passwords

Show Answer

Correct Answer: b) To protect data by converting it into a secure format
Explanation: Encryption converts data into a secure format that can only be decrypted by authorized parties. This protects data from unauthorized access and ensures its confidentiality.

Q32. What is a “virus” in cybersecurity?
a) A type of hardware device
b) A malicious program that attaches itself to files and spreads
c) A tool for network management
d) A method for data encryption

Show Answer

Correct Answer: b) A malicious program that attaches itself to files and spreads
Explanation: A virus is a type of malware that attaches itself to legitimate files and spreads to other files and systems. It can cause damage and disrupt normal operations.

Q33. What is “two-factor authentication”?
a) A method to encrypt data
b) A security process that requires two forms of verification
c) A type of malware
d) A network management tool

Show Answer

Correct Answer: b) A security process that requires two forms of verification
Explanation: Two-factor authentication enhances security by requiring users to provide two different forms of verification before accessing an account or system. This adds an extra layer of protection against unauthorized access.

Q34. How does a firewall help in securing a network?
a) By encrypting network traffic
b) By blocking unauthorized access and monitoring traffic
c) By scanning for viruses
d) By managing user permissions

Show Answer

Correct Answer: b) By blocking unauthorized access and monitoring traffic
Explanation: A firewall helps secure a network by blocking unauthorized access based on security rules and monitoring incoming and outgoing traffic to detect and prevent potential threats.

Q35. What does “data protection” involve?
a) Storing data in a secure location
b) Creating strong passwords
c) Ensuring that data is kept confidential and secure
d) Regularly updating software

Show Answer

Correct Answer: c) Ensuring that data is kept confidential and secure
Explanation: Data protection involves measures to keep data confidential and secure from unauthorized access, loss, or corruption. It encompasses various strategies and practices to safeguard information.

Q36. What is a “spyware”?
a) Software designed to protect against malware
b) Software that secretly collects user data without consent
c) A type of firewall
d) A method of encryption

Show Answer

Correct Answer: b) Software that secretly collects user data without consent
Explanation: Spyware is a type of malware that secretly collects and transmits user data without their consent. It often tracks user activity and can invade privacy.

Q37. What is “risk management” in cybersecurity?
a) Encrypting data for transmission
b) Implementing controls to mitigate identified risks
c) Monitoring network traffic
d) Installing antivirus software

Show Answer

Correct Answer: b) Implementing controls to mitigate identified risks
Explanation: Risk management involves identifying, assessing, and implementing controls to mitigate or manage risks. It aims to reduce the likelihood and impact of potential security threats.

Q38. What is a “security mechanism”?
a) A tool for managing passwords
b) A technique or tool used to enforce security policies
c) A type of malware
d) A method for data recovery

Show Answer

Correct Answer: b) A technique or tool used to enforce security policies
Explanation: Security mechanisms are techniques or tools used to implement and enforce security policies. They help in protecting information and systems by providing various security functions.

Q39. What is a “security policy”?
a) A document outlining organizational security rules and guidelines
b) A type of malware
c) A method for network management
d) A software for encrypting data

Show Answer

Correct Answer: a) A document outlining organizational security rules and guidelines
Explanation: A security policy is a formal document that outlines the rules, procedures, and guidelines for managing and protecting an organization’s information and resources from security threats.

Q40. What does the term “netiquette” refer to?
a) The use of network security tools
b) Guidelines for polite and effective online communication
c) Techniques for encrypting data
d) Methods for monitoring network traffic

Show Answer

Correct Answer: b) Guidelines for polite and effective online communication
Explanation: Netiquette refers to the set of guidelines for courteous and effective communication on the internet. It helps ensure respectful and appropriate interactions in online environments.

Advertisement
error: Content is protected !!
Scroll to Top