MCQ on Overview of Cyber Security | NIELIT CCC

Advertisement

Q31. What is a key feature of a secure smartphone?
a) High-resolution camera
b) Strong encryption for data storage and communication
c) Extensive app collection
d) Large screen size

Show Answer

Correct Answer: b) Strong encryption for data storage and communication
Explanation: Strong encryption protects data stored on a smartphone and secures communication by encoding information, making it difficult for unauthorized users to access or intercept sensitive data.

Q32. What does ‘social engineering’ refer to in cyber security?
a) A method of network optimization
b) Manipulating people into divulging confidential information
c) A type of encryption algorithm
d) A software development technique

Show Answer

Correct Answer: b) Manipulating people into divulging confidential information
Explanation: Social engineering involves manipulating individuals into revealing confidential information, such as passwords or personal details, often through deceptive tactics like phishing or pretexting.

Q33. What is the function of a ‘spam filter’ in email security?
a) To enhance email delivery speed
b) To detect and block unwanted or malicious emails
c) To improve email organization
d) To increase email storage capacity

Show Answer

Correct Answer: b) To detect and block unwanted or malicious emails
Explanation: A spam filter detects and blocks unwanted or potentially harmful emails, reducing the risk of phishing attacks, malware infections, and other email-based threats.

Q34. What should you do if you receive a suspicious email requesting personal information?
a) Reply with the requested information
b) Ignore it and delete the email
c) Forward it to friends for verification
d) Click on the links provided in the email

Show Answer

Correct Answer: b) Ignore it and delete the email
Explanation: It is important to ignore and delete suspicious emails that request personal information, as they may be phishing attempts. Forwarding or clicking links could lead to security risks.

Q35. What is the role of encryption in cyber security?
a) To enhance software performance
b) To protect data by converting it into a secure format
c) To increase network speed
d) To manage user access rights

Show Answer

Correct Answer: b) To protect data by converting it into a secure format
Explanation: Encryption protects data by converting it into a format that is unreadable to unauthorized users. Only those with the correct decryption key can access the original information, ensuring data security.

Q36. What is the function of a security patch in software?
a) To add new features
b) To fix security vulnerabilities and bugs
c) To improve user interface
d) To increase software compatibility

Show Answer

Correct Answer: b) To fix security vulnerabilities and bugs
Explanation: Security patches are updates that address and fix vulnerabilities and bugs in software, helping to protect the system from potential security threats and improving overall stability.

Q37. What does ‘malware’ typically include?
a) Only viruses
b) Only spyware
c) Various types including viruses, worms, and trojans
d) Only adware

Show Answer

Correct Answer: c) Various types including viruses, worms, and trojans
Explanation: Malware is a broad category of malicious software that includes viruses, worms, trojans, and other types of harmful programs designed to damage or gain unauthorized access to systems.

Q38. How can you protect your personal information online?
a) By sharing it freely on social media
b) By using strong passwords and enabling privacy settings
c) By storing it in plain text files
d) By using public Wi-Fi for sensitive transactions

Show Answer

Correct Answer: b) By using strong passwords and enabling privacy settings
Explanation: Using strong passwords and enabling privacy settings helps protect personal information online by reducing the risk of unauthorized access and ensuring that sensitive data is kept secure.

Q39. What is ‘two-factor authentication’ (2FA)?
a) A method of generating random passwords
b) A security feature requiring two forms of verification
c) A tool for encrypting emails
d) A software for managing passwords

Show Answer

Correct Answer: b) A security feature requiring two forms of verification
Explanation: Two-factor authentication (2FA) enhances security by requiring users to provide two different forms of verification, such as a password and a code sent to a mobile device, to access their accounts.

Q40. What is a common characteristic of a secure password?
a) It is short and simple
b) It includes a combination of letters, numbers, and symbols
c) It is easily guessable
d) It is the same for multiple accounts

Show Answer

Correct Answer: b) It includes a combination of letters, numbers, and symbols
Explanation: A secure password includes a mix of letters, numbers, and symbols, making it more difficult for attackers to guess or crack. This increases the overall security of the account.

Advertisement
error: Content is protected !!
Scroll to Top