MCQ on Overview of Cyber Security | NIELIT CCC

Advertisement

Q81. What is a ‘virus’ in the context of cyber security?
a) A type of encryption method
b) A malicious program that replicates itself and spreads to other systems
c) A tool for enhancing system performance
d) A method for improving network speed

Show Answer

Correct Answer: b) A malicious program that replicates itself and spreads to other systems
Explanation: A virus is a type of malicious program that attaches itself to legitimate files and replicates, spreading to other systems and potentially causing harm by corrupting data or disrupting operations.

Q82. What is ’email spoofing’?
a) Sending legitimate emails with encryption
b) Creating fake email addresses to deceive recipients
c) Enhancing email security features
d) Managing email spam filters

Show Answer

Correct Answer: b) Creating fake email addresses to deceive recipients
Explanation: Email spoofing involves creating fake email addresses to deceive recipients into believing the email is from a trusted source, often used in phishing attacks to trick individuals into disclosing personal information.

Q83. What is the purpose of ‘password complexity’?
a) To increase the length of passwords
b) To make passwords more difficult to guess or crack
c) To simplify password management
d) To decrease the number of password changes

Show Answer

Correct Answer: b) To make passwords more difficult to guess or crack
Explanation: Password complexity involves creating passwords with a combination of letters, numbers, and special characters to make them more difficult for attackers to guess or crack, enhancing overall security.

Q84. What does ‘data breach’ refer to?
a) Regular updates to software
b) Unauthorized access and retrieval of sensitive data
c) Increased network bandwidth
d) Enhanced system performance

Show Answer

Correct Answer: b) Unauthorized access and retrieval of sensitive data
Explanation: A data breach refers to an incident where unauthorized individuals gain access to and retrieve sensitive data, often resulting in data theft, privacy violations, and potential harm to affected individuals or organizations.

Q85. How can you avoid falling victim to ‘social engineering’ attacks?
a) By using a simple password
b) By verifying the identity of individuals requesting sensitive information
c) By sharing personal details freely
d) By ignoring all security warnings

Show Answer

Correct Answer: b) By verifying the identity of individuals requesting sensitive information
Explanation: To avoid falling victim to social engineering attacks, it is crucial to verify the identity of individuals requesting sensitive information before disclosing any data, as social engineers often use deception to exploit trust.

Q86. What is a ‘public Wi-Fi network’ known for in terms of security risks?
a) Being highly secure and encrypted
b) Providing high-speed internet access
c) Being prone to interception and unauthorized access
d) Offering limited network bandwidth

Show Answer

Correct Answer: c) Being prone to interception and unauthorized access
Explanation: Public Wi-Fi networks are known for security risks due to their open nature, which makes them susceptible to interception and unauthorized access. Users should avoid accessing sensitive information on such networks or use a VPN for added security.

Q87. What does ‘regularly updating software’ help to prevent?
a) High internet usage
b) Outdated system features
c) Security vulnerabilities and potential exploits
d) Increased file storage

Show Answer

Correct Answer: c) Security vulnerabilities and potential exploits
Explanation: Regularly updating software helps prevent security vulnerabilities and potential exploits by applying patches and fixes that address known issues, reducing the risk of cyber attacks and ensuring better protection for the system.

Q88. What is a ‘security audit’?
a) A process of evaluating system performance
b) A thorough examination of security measures and practices
c) A method for increasing storage capacity
d) A tool for managing network traffic

Show Answer

Correct Answer: b) A thorough examination of security measures and practices
Explanation: A security audit involves a thorough examination of security measures and practices to identify weaknesses and ensure that security policies and controls are effectively implemented to protect against threats.

Q89. How can you recognize a ‘phishing email’?
a) It includes a green padlock icon
b) It contains urgent or threatening language and requests personal information
c) It has a standard email signature
d) It provides contact details for customer support

Show Answer

Correct Answer: b) It contains urgent or threatening language and requests personal information
Explanation: A phishing email often uses urgent or threatening language to create a sense of urgency and requests personal information from the recipient. Recognizing these signs can help identify and avoid falling victim to phishing scams.

Q90. What is the purpose of ‘backup copies’ in data security?
a) To increase storage capacity
b) To create additional copies of data for recovery in case of loss or corruption
c) To enhance system performance
d) To manage network traffic

Show Answer

Correct Answer: b) To create additional copies of data for recovery in case of loss or corruption
Explanation: Backup copies are created to ensure data recovery in case of loss, corruption, or hardware failure. Regular backups protect against data loss and provide a way to restore information to a secure state.

Advertisement
error: Content is protected !!
Scroll to Top