Modal MCQ on Introduction to Cyber security
1. What is Cyberspace?
a. A physical computer network
b. A virtual space for online communication
c. A type of computer virus
d. An offline storage system
Answer: b. A virtual space for online communication
2. Who coined the term "Cyberspace" and in which year?
a. Tim Berners-Lee, 1989
b. William Gibson, 1984
c. Mark Zuckerberg, 2004
d. Al Gore, 1997
Answer: b. William Gibson, 1984
3. What is the primary purpose of creating Cyberspace?
a. Gaming
b. E-commerce
c. Entertainment
d. Sharing information and global communication
Answer: d. Sharing information and global communication
4. What are the fundamental building blocks of the Internet during the Innovation Phase?
a. Web browsers
b. Packet-switching hardware, TCP/IP, client/server computing
c. Cloud services
d. DNS and HTTP protocols
Answer: b. Packet-switching hardware, TCP/IP, client/server computing
5. Who is credited with inventing the World Wide Web in 1989?
a. Bill Gates
b. Steve Jobs
c. Tim Berners-Lee
d. Larry Page
Answer: C) Tim Berners-Lee
6. What does the term "Internet of Things (IoT)" refer to in Cyberspace?
a. Internet browsers
b. Connected devices exchanging data
c. Social media platforms
d. Cloud computing services
Answer: B) Connected devices exchanging data
7. What does DNS stand for in the context of Cyberspace?
a. Dynamic Network System
b. Domain Name System
c. Data Network Security
d. Digital Naming Service
Answer: B) Domain Name System
8. What does TCP/IP stand for in the context of Internet communication?
a. Total Control Protocol/Internet Protocol
b. Transmission Control Protocol/Internet Protocol
c. Technical Control Protocol/Internet Process
d. Transferable Communication Protocol/Internet Process
Answer: B) Transmission Control Protocol/Internet Protocol
9.What organization establishes web standards to ensure compatibility and accessibility
across different devices and browsers?
a. W3C (World Wide Web Consortium)
b. IEEE (Institute of Electrical and Electronics Engineers)
c. ISO (International Organization for Standardization)
d. IETF (Internet Engineering Task Force)
Answer: A) W3C (World Wide Web Consortium)
10. What is the official birthday of the Internet, marking the establishment of the TCP/IP
protocol?
a. January 1, 1980
b. January 1, 1983
c. July 4, 1976
d. March 12, 1990
Answer: B) January 1, 1983
11. Which of the following is a web-based cyber-attack that attempts to steal sensitive
information by masquerading as a trustworthy entity?
a. Worm
b. Phishing
c. Trojan Horse
d. Denial of Service
Answer: B) Phishing
12. What is the term for a self-replicating malicious program that spreads throughout
computer files?
a. Worm
b. Trojan Horse
c. Virus
d. Phishing
Answer: C) Virus
13. Which technology involves creating and maintaining websites and web applications?
a. Cloud Computing
b. Web Development
c. Mobile Web
d. Networking
Answer: B) Web Development
14. Which organization oversees domain name system management and policy?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. Internet Corporation for Assigned Names and Numbers (ICANN)
d. World Wide Web Consortium (W3C)
Answer: c. Internet Corporation for Assigned Names and Numbers (ICANN)
15. What is the primary goal of Cybersecurity?
a. Ensuring data accuracy
b. Preventing unauthorized access and protecting systems
c. Maximizing processing power
d. Facilitating data sharing
Answer: b. Preventing unauthorized access and protecting systems
16. Which protocol is fundamental to internet communication and allows data packets to
be routed across the network?
a. HTTP
b. FTP
c. TCP/IP
d. SMTP
Answer: c. TCP/IP
17. What does the World Wide Web (WWW) consist of?
a. A collection of servers
b. A global system of interconnected documents and resources
c. A type of computer virus
d. A hardware component of the internet
Answer: b. A global system of interconnected documents and resources
18. What phase of the Internet's history is characterized by commercialization?
a. Innovation Phase
b. Institutionalization Phase
c. Commercialization Phase
d. Development Phase
Answer: c. Commercialization Phase
19. What is the primary responsibility of the Internet Architecture Board (IAB)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: c. Adjudicate on disputes about standards
20. Which attack aims to make a server or network resource unavailable to users?
a. Injection attack
b. Denial of Service (DoS) attack
c. Phishing attack
d. Worm attack
Answer: b. Denial of Service (DoS) attack
21. What is the primary purpose of the Internet Engineering Task Force (IETF)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: a. Develop technical standards for the Internet
22. What technology is responsible for translating domain names into IP addresses?
a. HTTP
b. FTP
c. DNS
d. TLS
Answer: c. DNS
23. What is the primary goal of a Trojan horse?
a. Spread to uninfected computers
b. Steal sensitive information
c. Manipulate computer settings
d. Replicate itself
Answer: c. Manipulate computer settings
24. What type of attack involves masquerading as a trustworthy entity to steal sensitive
information?
a. Injection attack
b. Phishing attack
c. Session Hijacking
d. Denial of Service (DoS) attack
Answer: b. Phishing attack
25. What phase of the Internet's history is characterized by the conceptualization and
implementation of fundamental building blocks?
a. Innovation Phase
b. Institutionalization Phase
c. Commercialization Phase
d. Development Phase
Answer: a. Innovation Phase
26. What technology enables the seamless user experience on smartphones and tablets?
a. Web development
b. Mobile web technology
c. Cloud computing
d. Quality of Service (QoS)
Answer: b. Mobile web technology
27. What ensures that systems and data are accurate and trustworthy in cybersecurity?
a. Availability
b. Authentication
c. Integrity
d. Confidentiality
Answer: c. Integrity
28. Which organization promotes the use and future development of the internet?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. World Wide Web Consortium (W3C)
d. Internet Corporation for Assigned Names and Numbers (ICANN)
Answer: a. Internet Society (ISOC)
29. What does SSL/TLS encryption primarily contribute to in internet infrastructure?
a. Data privacy
b. Network infrastructure
c. DNS functionality
d. Cloud services
Answer: a. Data privacy
30. What is the purpose of an Injection attack?
a. Encryption of data
b. Manipulation of the application to fetch information
c. Stealing sensitive information
d. Making a server unavailable
Answer: b. Manipulation of the application to fetch information
31. What is the primary responsibility of the Internet Engineering Steering Group (IESG)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Review standards proposed by the IETF
d. Enforce cyber laws
Answer: c. Review standards proposed by the IETF
32. What characterizes the Institutionalization Phase of the Internet's history?
a. Conceptualization of fundamental building blocks
b. Commercialization of the Internet
c. Development of hardware components
d. Funding and legitimization by large institutions
Answer: d. Funding and legitimization by large institutions
33. What technology is used to optimize data delivery by caching content at various
locations worldwide?
a. CDN (Content Delivery Network)
b. VPN (Virtual Private Network)
c. DNS (Domain Name System)
d. HTTP (Hypertext Transfer Protocol)
Answer: a. CDN (Content Delivery Network)
34. What is the primary goal of the Innovation Phase of the Internet's history?
a. Commercialization
b. Conceptualization of fundamental building blocks
c. Development of hardware components
d. High-speed data transfer
Answer: b. Conceptualization of fundamental building blocks
35. What does the lack of formal framework in cyberspace result in?
a. Strong regulation
b. Anonymity (nobody's domain)
c. Centralized control
d. Limited freedom
Answer: b. Anonymity (nobody's domain)
36. What is the primary challenge in extending traditional laws to cyberspace?
a. Multiple Jurisdictions
b. Lack of technical knowledge
c. Expensive process
d. Obtaining digital evidence
Answer: a. Multiple Jurisdictions
37. What What does URL stand for?
a. Universal Resource Locator
b. Unified Resource Locator
c. Uniform Resource Locator
d. Ultimate Resource Locator
Answer: c. Uniform Resource Locator
38. What does the term "governance" in cyberspace refer to?
a. Development of software
b. Policies, regulations, and oversight
c. Web design
d. Internet infrastructure management
Answer: b. Policies, regulations, and oversight
39. What does the term "WWW" stand for?
a. World Web Wonders
b. Wide World of Web
c. World Wide Web
d. Web World Wide
Answer: c. World Wide Web
40. What does the term "HTML" stand for?
a. HyperText Markup Language
b. Hypnotic Text Manipulation Language
c. High-Tech Multimedia Language
d. Hyperlink and Text Management Language
Answer: a. HyperText Markup Language
41. What are the building blocks of a computer's hardware?
a. RAM, SSD, CPU
b. CPU, GPU, PSU
c. CPU, RAM, Storage (HDD/SSD), Input/Output devices
d. GPU, SSD, Monitor
Answer: c) CPU, RAM, Storage (HDD/SSD), Input/Output devices
42. What does QoS stand for in the context of internet infrastructure?
a. Quality of Security
b. Quality of Service
c. Quantity of Servers
d. Quantum of Speed
Answer: b) Quality of Service
43. What is the primary goal of data encryption in cybersecurity?
a. Making data accessible when needed
b. Preventing unauthorized access or disclosure of sensitive information
c. Replicating malicious code
d. Verifying the identity of users
Answer: b) Preventing unauthorized access or disclosure of sensitive information
44. What is the primary focus of the Institutionalization Phase in the history of the
Internet?
a. Commercialization
b. Conceptualizing and implementing fundamental building blocks
c. Providing funding and legitimization
d. Regulation
Answer: c) Providing funding and legitimization
45. What is the primary challenge posed by insider threats in cybersecurity?
a. High internet speed
b. Lack of resources
c. Difficulty in detection and prevention
d. Abundance of technical knowledge
Answer: c) Difficulty in detection and prevention
46. Which component translates human-readable domain names into IP addresses in
Cyberspace?
a. HTTP
b. DNS
c. TCP
d. IP
Answer: b. DNS
47. Which protocol is used for secure data transfer over the web?
a. HTTP
b. FTP
c. HTTPS
d. TCP
Answer: c. HTTPS
48. What does ARPANET stand for?
a. Advanced Research Projects Agency Network
b. American Research Project for Advanced Networking
c. Association of Research Professionals and Networking
d. Automated Research Program for Advanced Network Technologies
Answer: a. Advanced Research Projects Agency Network
49. What is the role of web browsers like Google Chrome and Mozilla Firefox?
a. Store data
b. Create websites
c. Access and interact with web content
d. Manage hardware resources
Answer: C) Access and interact with web content
50. Which protocol is responsible for the actual delivery of packets in TCP/IP?
a. TCP
b. IP
c. HTTP
d. DNS
Answer: b. IP