MCQ on Cyber Security | NIELIT CCC Plus

Advertisement

Q51. What does “integrity” in data security mean?
a) Data is available when needed
b) Data is protected from unauthorized access
c) Data remains accurate and unaltered
d) Data is encrypted during storage

Show Answer

Correct Answer: c) Data remains accurate and unaltered
Explanation: Integrity ensures that data remains accurate and unaltered during storage, processing, and transmission. It prevents unauthorized changes and maintains the reliability of information.

Q52. What is a “spyware”?
a) Software designed to manage network traffic
b) Software that secretly monitors and collects user information
c) A tool for encrypting data
d) A type of malware for network attacks

Show Answer

Correct Answer: b) Software that secretly monitors and collects user information
Explanation: Spyware is a type of malware designed to secretly monitor and collect user information without consent. It can invade privacy and compromise sensitive data.

Q53. What does the “IT Act 2000” primarily address?
a) Software development
b) Electronic commerce, cybercrime, and electronic records
c) Network infrastructure
d) Intellectual property rights

Show Answer

Correct Answer: b) Electronic commerce, cybercrime, and electronic records
Explanation: The IT Act 2000 provides a legal framework for electronic commerce, cybercrime, and electronic records. It addresses issues related to digital transactions and online security in India.

Q54. What is the purpose of “antivirus software”?
a) To encrypt data
b) To scan, detect, and remove malicious software
c) To manage network traffic
d) To create strong passwords

Show Answer

Correct Answer: b) To scan, detect, and remove malicious software
Explanation: Antivirus software is used to scan, detect, and remove malicious software such as viruses, worms, and Trojans. It helps protect systems from various types of malware.

Q55. What is “private browsing mode”?
a) A feature that stores browsing history
b) A mode that hides browsing activity from others on the same device
c) A method to speed up internet connection
d) A tool for encrypting online communications

Show Answer

Correct Answer: b) A mode that hides browsing activity from others on the same device
Explanation: Private browsing mode prevents the web browser from saving browsing history, cookies, and other site data, thus helping to keep browsing activity private from others who may use the same device.

Q56. What does “risk assessment” involve?
a) Encrypting sensitive data
b) Identifying and evaluating potential security risks
c) Implementing network security measures
d) Monitoring system performance

Show Answer

Correct Answer: b) Identifying and evaluating potential security risks
Explanation: Risk assessment involves identifying and evaluating potential security risks to determine their impact and likelihood. This helps in prioritizing and implementing appropriate security measures.

Q57. What is a “data breach”?
a) A method for securing data
b) An incident where unauthorized access to data occurs
c) A type of firewall
d) A software for monitoring network traffic

Show Answer

Correct Answer: b) An incident where unauthorized access to data occurs
Explanation: A data breach is an incident where unauthorized access to data occurs, potentially exposing sensitive information to unauthorized individuals or entities.

Q58. What is the main role of encryption in cybersecurity?
a) To manage network traffic
b) To secure data by converting it into an unreadable format
c) To scan for malware
d) To create backup copies of data

Show Answer

Correct Answer: b) To secure data by converting it into an unreadable format
Explanation: Encryption secures data by converting it into an unreadable format that can only be decrypted by authorized parties. This protects data from unauthorized access and ensures confidentiality.

Q59. What is a “security control”?
a) A type of malware
b) A measure implemented to mitigate security risks
c) A network monitoring tool
d) A method for data recovery

Show Answer

Correct Answer: b) A measure implemented to mitigate security risks
Explanation: Security controls are measures or safeguards implemented to mitigate security risks and protect information systems from potential threats and vulnerabilities.

Q60. What is the primary function of a “security policy”?
a) To enhance system performance
b) To outline guidelines and procedures for maintaining security
c) To create strong passwords
d) To manage network traffic

Show Answer

Correct Answer: b) To outline guidelines and procedures for maintaining security
Explanation: A security policy provides a framework of guidelines and procedures for maintaining and managing security within an organization. It helps ensure consistent application of security practices.

Advertisement
« Prev1 ... 45 6 78 ... 10» Next
error: Content is protected !!
Scroll to Top