0% found this document useful (0 votes)
42 views

Introduction of Cyber Security Vac MCQ Question Pattern

Uploaded by

Vivek Roy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Introduction of Cyber Security Vac MCQ Question Pattern

Uploaded by

Vivek Roy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

BARASAT COLLEGE

Sub: cybersecurity
Department of Computer Science
Prof: Tutan Ghosh
Mob: 9836989900
1. which of the following is a common method used by cyber attackers to gain unauthorized access
to computer systems?

A) Social Engineering B) Encryption C) Firewall D) Antivirus Software

Answer: A) Social Engineering

2. What does the term "phishing" refer to in the context of cybersecurity?

A) A technique to encrypt sensitive data B) A method to detect malware on a system C) An attack


that attempts to trick individuals into revealing sensitive information D) A type of firewall
configuration

Answer: C) An attack that attempts to trick individuals into revealing sensitive information

3. Which of the following is a fundamental principle of cybersecurity that emphasizes limiting access
to authorized users only?

A) Least Privilege B) Open Access C) Full Permissions D) Wide Authorization

Answer: A) Least Privilege

4. What type of cyber attack involves overwhelming a computer system or network with a flood of
data packets in order to disrupt its normal functioning?

A) Phishing B) Denial-of-Service (DoS) C) Man-in-the-Middle (MitM) D) Ransomware

Answer: B) Denial-of-Service (DoS)

5.Which of the following is NOT considered a common cybersecurity threat?

A) Malware B) Distributed Denial-of-Service (DDoS) attacks C) Software updates D) Insider threats

Answer: C) Software updates

6. Which of the following statements accurately describes the concept of "cyber resilience"?
A) Cyber resilience refers to the ability of a system to resist cyber attacks without any impact. B)
Cyber resilience is the practice of building systems and processes that can quickly recover from cyber
attacks and adapt to new threats. C) Cyber resilience involves preventing all cyber attacks through
robust security measures. D) Cyber resilience is only relevant for large organizations and not for
individuals or small businesses.

Answer: B) Cyber resilience is the practice of building systems and processes that can quickly recover
from cyber attacks and adapt to new threats.

7. What is the primary purpose of a Virtual Private Network (VPN) in the context of cybersecurity?

A) To encrypt sensitive data stored on a local computer. B) To provide secure and encrypted
communication over a public network, such as the internet. C) To detect and remove malware from
a computer system. D) To prevent physical access to computer hardware.

Answer: B) To provide secure and encrypted communication over a public network, such as the
internet.

8. Which of the following best describes the role of a firewall in cybersecurity?

A) It is a tool used to encrypt sensitive data. B) It is a device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. C) It is a type of
malware designed to steal sensitive information. D) It is a technique used to exploit vulnerabilities in
computer systems.

Answer: B) It is a device or software that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.

9. What is the purpose of a security token in authentication systems?

A) To encrypt data during transmission. B) To generate one-time passwords for authentication. C) To


scan for and remove malware from a system. D) To monitor network traffic for suspicious activity.

Answer: B) To generate one-time passwords for authentication.

10. Which of the following is an example of a social engineering attack?

A) Installing antivirus software on a computer system. B) Encrypting sensitive files to protect them
from unauthorized access. C) Sending an email pretending to be from a trusted source, asking for
login credentials. D) Configuring a firewall to block malicious incoming traffic.

Answer: C) Sending an email pretending to be from a trusted source, asking for login credentials.

11. What term is used to describe a cybersecurity attack where an attacker intercepts
communication between two parties and may alter or eavesdrop on the communication?

A) Phishing B) Man-in-the-Middle (MitM) C) Denial-of-Service (DoS) D) Ransomware


Answer: B) Man-in-the-Middle (MitM)

12. Which of the following cybersecurity measures is used to prevent unauthorized access by users
or software to a network or system?

A) Antivirus software B) Encryption C) Authentication D) Intrusion Detection System (IDS)

Answer: C) Authentication

13. What term describes a cybersecurity attack where an attacker sends a large volume of traffic to a
website or server, causing it to become unavailable to legitimate users?

A) Spoofing B) Phishing C) Denial-of-Service (DoS) D) Ransomware

Answer: C) Denial-of-Service (DoS)

14. What is the primary purpose of encryption in cybersecurity?

A) To detect and remove malware from a system. B) To prevent unauthorized access to sensitive
data by encrypting it. C) To monitor network traffic for suspicious activity. D) To provide secure
authentication for users.

Answer: B) To prevent unauthorized access to sensitive data by encrypting it.

15. Which of the following is a common method used to protect sensitive information transmitted
over the internet?

A) Firewall B) VPN (Virtual Private Network) C) Antivirus software D) Encryption

Answer: D) Encryption

16. What term is used to describe a cybersecurity attack where an attacker sends deceptive emails
or messages to trick individuals into revealing sensitive information, such as passwords or credit card
numbers?

A) Malware B) Denial-of-Service (DoS) C) Phishing D) Spoofing

Answer: C) Phishing

17. What is the term for a cybersecurity attack that involves an attacker gaining unauthorized access
to a system by exploiting vulnerabilities in software or hardware?

A) Phishing B) Social engineering C) Malware D) Exploit

Answer: D) Exploit
18. What is the purpose of a CAPTCHA in cybersecurity?

A) To encrypt sensitive data during transmission. B) To detect and remove malware from a system.
C) To authenticate users based on their biometric data. D) To distinguish between human users and
automated bots.

Answer: D) To distinguish between human users and automated bots.

19. What term refers to a cybersecurity attack where an attacker gains unauthorized access to a
system by tricking individuals into revealing their login credentials?

A) Denial-of-Service (DoS) B) Man-in-the-Middle (MitM) C) Phishing D) Ransomware

Answer: C) Phishing

20. Which cybersecurity measure is designed to detect and prevent unauthorized access to
computer systems or networks by analyzing incoming and outgoing traffic?

A) Antivirus software B) Firewall C) Encryption D) Intrusion Detection System (IDS)

Answer: D) Intrusion Detection System (IDS)

21: What term describes a cybersecurity attack that involves an attacker pretending to be someone
else in order to gain unauthorized access to a system or network?

A) Spoofing B) Phishing C) Encryption D) Denial-of-Service (DoS)

Answer: A) Spoofing

22: Which of the following is NOT a common type of malware?

A) Trojan horse B) Spyware C) Firewall D) Ransomware

Answer: C) Firewall

23: What does the acronym "DDoS" stand for in the context of cybersecurity?

A) Distributed Denial-of-Service B) Data Destruction System C) Digital Defense Service D) Dangerous


Data Scanner

Answer: A) Distributed Denial-of-Service

24: Which cybersecurity measure involves converting plaintext into ciphertext to protect sensitive
information from unauthorized access?

A) Authentication B) Intrusion Detection C) Encryption D) Phishing

Answer: C) Encryption
25: What is the term for a software vulnerability that is unknown to the software developer and
typically exploited by attackers before a patch is available?

A) Zero-day exploit B) Phishing attack C) Firewall breach D) Malware infection

Answer: A) Zero-day exploit

26: What type of attack involves an attacker intercepting and possibly altering communication
between two parties without their knowledge?

A) Firewall breach B) Spoofing C) Man-in-the-Middle (MitM) D) Ransomware

Answer: C) Man-in-the-Middle (MitM)

27: Which of the following is an example of a physical security measure?

A) Encryption B) Firewall C) Biometric authentication D) Intrusion Detection System (IDS)

Answer: C) Biometric authentication

28: What is the term for a cybersecurity attack that involves an attacker gaining access to a system
by exploiting software vulnerabilities?

A) Phishing B) Spoofing C) Exploit D) Ransomware

Answer: C) Exploit

29: Which cybersecurity measure is designed to identify, assess, and prioritize vulnerabilities in
computer systems and software?

A) Penetration testing B) Intrusion Detection System (IDS) C) Patch management D) Vulnerability


assessment

Answer: D) Vulnerability assessment

30: What term refers to the practice of tricking individuals into divulging sensitive information or
performing actions that compromise security?

A) Spoofing B) Social engineering C) Malware D) Encryption

Answer: B) Social engineering

31: What type of cybersecurity attack involves an attacker eavesdropping on communication


between two parties to steal sensitive information such as passwords or financial data?

A) Phishing B) Denial-of-Service (DoS) C) Man-in-the-Middle (MitM) D) Ransomware

Answer: C) Man-in-the-Middle (MitM)

32: Which of the following best describes the term "firewall" in the context of cybersecurity?

A) A device or software that monitors and controls incoming and outgoing network traffic based on
predetermined security rules. B) A type of malware that spreads through email attachments and
encrypts files on a victim's computer. C) A technique used by attackers to gain unauthorized access
to a system by impersonating a legitimate entity. D) A physical barrier installed around computer
systems to prevent physical access by unauthorized individuals.
Answer: A) A device or software that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.

33: What is the primary purpose of antivirus software in cybersecurity?

A) To encrypt sensitive data during transmission. B) To prevent unauthorized access to computer


systems. C) To detect and remove malicious software (malware) from computer systems. D) To
authenticate users accessing computer systems.

Answer: C) To detect and remove malicious software (malware) from computer systems.

34: What term refers to a type of cyber attack in which an attacker encrypts files on a victim's
computer and demands a ransom for their release?

A) Phishing B) Denial-of-Service (DoS) C) Ransomware D) Spoofing

Answer: C) Ransomware

35: Which of the following is an example of a biometric authentication method?

A) Username and password B) Security token C) Fingerprint scanner D) One-time password (OTP)

Answer: C) Fingerprint scanner

36: What cybersecurity measure is designed to monitor network traffic for suspicious activities or
anomalies?

A) Antivirus software B) Encryption C) Intrusion Detection System (IDS) D) Patch management

Answer: C) Intrusion Detection System (IDS)

37: What is the purpose of a VPN (Virtual Private Network) in cybersecurity?

A) To detect and remove malware from network traffic. B) To encrypt sensitive data stored on local
devices. C) To provide secure and private communication over public networks. D) To authenticate
users accessing network resources.

Answer: C) To provide secure and private communication over public networks.

38: What term refers to a cybersecurity attack that involves an attacker sending deceptive emails or
messages to trick individuals into revealing sensitive information?

A) Spoofing B) Phishing C) Encryption D) Exploit

Answer: B) Phishing

39: What is the primary purpose of penetration testing in cybersecurity?

A) To identify and patch software vulnerabilities. B) To monitor network traffic for suspicious
activities. C) To simulate cyber attacks to assess the security of systems and networks. D) To encrypt
sensitive data during transmission.

Answer: C) To simulate cyber attacks to assess the security of systems and networks.

40: Which of the following best describes the term "social engineering" in the context of
cybersecurity?
A) A technique used to prevent unauthorized access to computer systems. B) A method of
encrypting sensitive data during transmission. C) The practice of tricking individuals into divulging
confidential information or performing actions that compromise security. D) A type of malware that
spreads through email attachments and encrypts files on a victim's computer.

Answer: C) The practice of tricking individuals into divulging confidential information or performing
actions that compromise security.

41: What term describes a cybersecurity attack that involves an attacker gaining unauthorized access
to a system by exploiting vulnerabilities in software or hardware?

A) Phishing B) Social engineering C) Exploit D) Ransomware

Answer: C) Exploit

42: Which of the following cybersecurity measures is used to prevent unauthorized access by users
or software to a network or system?

A) Authentication B) Encryption C) Antivirus software D) Intrusion Detection System (IDS)

Answer: A) Authentication

43: What is the term for a cybersecurity attack that involves an attacker intercepting communication
between two parties and may alter or eavesdrop on the communication?

A) Phishing B) Spoofing C) Denial-of-Service (DoS) D) Man-in-the-Middle (MitM)

Answer: D) Man-in-the-Middle (MitM)

44: What cybersecurity measure is designed to detect and prevent unauthorized access to computer
systems or networks by analyzing incoming and outgoing traffic?

A) Encryption B) Intrusion Detection System (IDS) C) Antivirus software D) Firewall

Answer: D) Firewall

45: What term refers to a cybersecurity attack where an attacker sends deceptive emails or
messages to trick individuals into revealing sensitive information?

A) Spoofing B) Phishing C) Denial-of-Service (DoS) D) Malware

Answer: B) Phishing

46: Which cybersecurity measure involves converting plaintext into ciphertext to protect sensitive
information from unauthorized access?

A) Authentication B) Intrusion Detection C) Encryption D) Patch management

Answer: C) Encryption

47: What is the primary purpose of antivirus software in cybersecurity?

A) To detect and remove malicious software (malware) from computer systems. B) To authenticate
users accessing computer systems. C) To encrypt sensitive data during transmission. D) To prevent
unauthorized access to computer systems.
Answer: A) To detect and remove malicious software (malware) from computer systems.

48: What is the term for a software vulnerability that is unknown to the software developer and
typically exploited by attackers before a patch is available?

A) Malware B) Zero-day exploit C) Phishing attack D) Firewall breach

Answer: B) Zero-day exploit

49: What type of attack involves an attacker intercepting and possibly altering communication
between two parties without their knowledge?

A) Spoofing B) Phishing C) Man-in-the-Middle (MitM) D) Ransomware

Answer: C) Man-in-the-Middle (MitM)

50: Which of the following is an example of a physical security measure?

A) Encryption B) Biometric authentication C) Intrusion Detection System (IDS) D) Antivirus software

Answer: B) Biometric authentication

51: What cybersecurity measure is designed to identify, assess, and prioritize vulnerabilities in
computer systems and software?

A) Penetration testing B) Patch management C) Vulnerability assessment D) Firewall configuration

Answer: C) Vulnerability assessment

52: What term refers to a type of cyber attack in which an attacker encrypts files on a victim's
computer and demands a ransom for their release?

A) Phishing B) Denial-of-Service (DoS) C) Ransomware D) Spoofing

Answer: C) Ransomware

53: Which of the following is an example of a biometric authentication method?

A) Username and password B) Fingerprint scanner C) Security token D) One-time password (OTP)

Answer: B) Fingerprint scanner

54: What is the purpose of a VPN (Virtual Private Network) in cybersecurity?

A) To provide secure and private communication over public networks. B) To authenticate users
accessing network resources. C) To detect and remove malware from network traffic. D) To encrypt
sensitive data stored on local devices.

Answer: A) To provide secure and private communication over public networks.

55: What term refers to a cybersecurity attack that involves an attacker sending deceptive emails or
messages to trick individuals into revealing sensitive information?

A) Spoofing B) Phishing C) Encryption D) Exploit

Answer: B) Phishing
Cyber Space & Crime:

Question 1: What is cybercrime? A) Crime committed using a computer or the internet. B) Crime
committed in cyberspace. C) Crime involving physical violence. D) Crime committed using traditional
methods.

Answer: A) Crime committed using a computer or the internet.

Question 2: Which of the following is an example of a cybercrime? A) Robbery committed using a


gun. B) Shoplifting in a physical store. C) Hacking into a company's database to steal customer
information. D) Jaywalking on the street.

Answer: C) Hacking into a company's database to steal customer information.

Question 3: What is a common motive behind cybercrimes? A) Financial gain B) Socializing C)


Environmental activism D) Political activism

Answer: A) Financial gain

Question 4: Which of the following is a cybersecurity challenge associated with the Internet of
Things (IoT)? A) Limited connectivity B) Lack of interoperability C) Decreased data generation D)
Reduced energy consumption

Answer: B) Lack of interoperability

Question 5: What term describes the use of computer technology to disrupt the normal functioning
of a system or network? A) Phishing B) Social engineering C) Cyber attack D) Encryption

Answer: C) Cyber attack

Question 6: Which of the following is a potential consequence of cybercrime? A) Improved network


security B) Increased trust in online transactions C) Financial loss for individuals and businesses D)
Enhanced privacy protection

Answer: C) Financial loss for individuals and businesses

Question 7: What is the purpose of cyber law? A) To regulate the use of social media platforms B) To
prevent the spread of fake news C) To establish rules and regulations for activities conducted in
cyberspace D) To promote online anonymity

Answer: C) To establish rules and regulations for activities conducted in cyberspace

Question 8: What term refers to the unauthorized access, use, disclosure, disruption, modification,
or destruction of electronic information? A) Cyberwarfare B) Cybersecurity C) Cyber espionage D)
Cybercrime

Answer: D) Cybercrime

Question 9: What is the primary aim of cyberterrorism? A) To promote peace and harmony in
cyberspace B) To engage in lawful online activities C) To cause fear, panic, and disruption by
targeting computer networks or systems D) To enhance cybersecurity measures globally

Answer: C) To cause fear, panic, and disruption by targeting computer networks or systems
Question 10: Which of the following is an example of cyber espionage? A) Distributing viruses to
disrupt computer networks B) Stealing sensitive information from government agencies or
corporations C) Conducting lawful online transactions D) Participating in online gaming communities

Answer: B) Stealing sensitive information from government agencies or corporations

Information and Data Security:

Question 1: What is the primary goal of information security? A) To ensure the confidentiality,
integrity, and availability of information. B) To maximize the use of information resources. C) To
restrict access to information. D) To delete unnecessary information.

Answer: A) To ensure the confidentiality, integrity, and availability of information.

Question 2: Which of the following is an example of a data security breach? A) Regular data backups
B) Implementing encryption protocols C) Unauthorized access to sensitive information D) Routine
software updates

Answer: C) Unauthorized access to sensitive information

Question 3: What does the term "confidentiality" refer to in information security? A) Ensuring that
information is accurate and reliable. B) Protecting information from unauthorized access and
disclosure. C) Making information readily available to authorized users. D) Encrypting information for
secure transmission.

Answer: B) Protecting information from unauthorized access and disclosure.

Question 4: Which of the following is an example of a technical control used to enhance data
security? A) Security awareness training for employees B) Access control mechanisms C) Data
classification policies D) Password policies

Answer: B) Access control mechanisms

Question 5: What is the purpose of encryption in data security? A) To prevent data loss B) To restrict
access to data C) To ensure data availability D) To protect data confidentiality

Answer: D) To protect data confidentiality

Question 6: What term describes the process of verifying that a user is who they claim to be? A)
Authorization B) Authentication C) Encryption D) Decryption

Answer: B) Authentication

Question 7: What does the term "integrity" mean in the context of data security? A) Protecting data
from unauthorized access and disclosure. B) Ensuring that data is accurate and reliable. C) Encrypting
data for secure transmission. D) Making data readily available to authorized users.

Answer: B) Ensuring that data is accurate and reliable.


Question 8: Which of the following is an example of a physical control used to enhance data
security? A) Antivirus software B) Firewalls C) Biometric authentication systems D) Secure locks on
server rooms

Answer: D) Secure locks on server rooms

Question 9: What term refers to the process of identifying, categorizing, and classifying data based
on its sensitivity? A) Data encryption B) Data backup C) Data classification D) Data anonymization

Answer: C) Data classification

Question 10: What is the purpose of data backup in data security? A) To prevent unauthorized
access to data B) To ensure data availability in case of loss or corruption C) To classify data based on
its sensitivity D) To authenticate users accessing data

Answer: B) To ensure data availability in case of loss or corruption

Ethical Hacking, Ethics and Cyber Laws

Question 1: What is ethical hacking? A) Unauthorized intrusion into computer systems for malicious
purposes. B) Testing computer systems for vulnerabilities with permission to improve security. C)
Creating viruses and malware to disrupt computer networks. D) Stealing sensitive information from
computer systems.

Answer: B) Testing computer systems for vulnerabilities with permission to improve security.

Question 2: What is the primary goal of an ethical hacker? A) To breach security defenses for
personal gain. B) To identify and fix security vulnerabilities in computer systems. C) To steal
confidential information from computer networks. D) To disrupt the normal functioning of computer
systems.

Answer: B) To identify and fix security vulnerabilities in computer systems.

Question 3: What ethical principle guides the practice of ethical hacking? A) Honesty B) Loyalty C)
Confidentiality D) Integrity

Answer: D) Integrity

Question 4: Which of the following is an example of an ethical hacking technique? A) Brute force
attack without permission B) SQL injection without authorization C) Penetration testing with consent
D) Social engineering to trick individuals into revealing passwords

Answer: C) Penetration testing with consent

Question 5: What term refers to the process of identifying and fixing security vulnerabilities in
computer systems? A) Cyber warfare B) Cybercrime C) Penetration testing D) Patch management

Answer: D) Patch management

Question 6: What ethical principle emphasizes the importance of respecting the privacy and
confidentiality of individuals' data? A) Integrity B) Confidentiality C) Availability D) Accountability

Answer: B) Confidentiality
Question 7: Which of the following is an example of an ethical consideration in cybersecurity? A)
Exploiting vulnerabilities without authorization B) Honoring user privacy and confidentiality C)
Ignoring security patches for software vulnerabilities D) Using malware to disrupt computer
networks

Answer: B) Honoring user privacy and confidentiality

Question 8: What is the purpose of cyber laws? A) To promote hacking activities B) To regulate the
ethical use of technology and protect individuals' rights C) To encourage cyber warfare D) To restrict
internet access

Answer: B) To regulate the ethical use of technology and protect individuals' rights

Question 9: Which of the following is a key aspect of cyber laws? A) Promoting unauthorized access
to computer systems B) Protecting intellectual property rights C) Encouraging cyberbullying D)
Facilitating cyber espionage

Answer: B) Protecting intellectual property rights

Question 10: What term refers to the legal and ethical guidelines that govern the use of technology
and the internet? A) Cybercrime laws B) Cybersecurity regulations C) Cyber ethics D) Cyber warfare
treaties

Answer: C) Cyber ethics

Various Attacks and malwares (virus, worm, spyware, Trojan horse):

Question 1: What is a computer virus? A) A type of malware that spreads over a network without
user intervention. B) Malicious software that hides inside legitimate programs and replicates itself.
C) A program that monitors user activity and collects sensitive information. D) Software designed to
gain unauthorized access to computer systems.

Answer: B) Malicious software that hides inside legitimate programs and replicates itself.

Question 2: What characteristic distinguishes a computer worm from a computer virus? A) A worm
requires human intervention to spread, while a virus spreads automatically. B) A worm spreads by
attaching itself to executable files, while a virus spreads independently. C) A worm does not require
a host program to spread, while a virus does. D) A worm infects the boot sector of a hard drive,
while a virus infects files.

Answer: C) A worm does not require a host program to spread, while a virus does.

Question 3: What is spyware? A) Malicious software that deletes or modifies data on a computer
system. B) Software that monitors user activity and collects sensitive information without the user's
knowledge. C) Malware that spreads rapidly over a network, causing disruption. D) A type of virus
that disguises itself as a legitimate program.

Answer: B) Software that monitors user activity and collects sensitive information without the user's
knowledge.

Question 4: Which of the following is a characteristic of a Trojan horse? A) It replicates itself and
spreads to other computers. B) It encrypts files and demands a ransom for their release. C) It
disguises itself as a legitimate program to deceive users. D) It deletes or modifies data on a computer
system.

Answer: C) It disguises itself as a legitimate program to deceive users.

Question 5: How does a Trojan horse typically enter a computer system? A) By exploiting
vulnerabilities in the operating system. B) By spreading over a network without user intervention. C)
By attaching itself to email attachments or downloads. D) By infecting executable files on the hard
drive.

Answer: C) By attaching itself to email attachments or downloads.

Question 6: Which type of malware is designed to encrypt files on a victim's computer and demand
payment for their decryption? A) Virus B) Worm C) Spyware D) Ransomware

Answer: D) Ransomware

Question 7: What is the primary purpose of a keylogger? A) To delete or modify data on a computer
system. B) To monitor user activity and collect keystrokes, including passwords and sensitive
information. C) To replicate itself and spread to other computers. D) To disguise itself as a legitimate
program to deceive users.

Answer: B) To monitor user activity and collect keystrokes, including passwords and sensitive
information.

Question 8: What is the main difference between a virus and a worm? A) A virus requires human
intervention to spread, while a worm spreads automatically. B) A virus infects files, while a worm
does not require a host program to spread. C) A virus encrypts files and demands ransom, while a
worm monitors user activity. D) A virus disguises itself as a legitimate program, while a worm deletes
or modifies data.

Answer: B) A virus infects files, while a worm does not require a host program to spread.

Question 9: Which of the following is a characteristic of a rootkit? A) It monitors user activity and
collects sensitive information. B) It spreads rapidly over a network, causing disruption. C) It modifies
or replaces system files to evade detection and gain privileged access. D) It encrypts files on a
computer system and demands payment for their decryption.

Answer: C) It modifies or replaces system files to evade detection and gain privileged access.

Question 10: What term refers to a type of malware that presents itself as a legitimate program but
performs malicious activities in the background? A) Virus B) Worm C) Spyware D) Trojan horse

Answer: D) Trojan horse

Digital Signature, Strategic policies for Password

Question 1: What is a digital signature? A) An electronic image of a handwritten signature. B) A


unique identifier used to access online accounts. C) An encrypted message used to verify the
authenticity and integrity of digital documents. D) A password used to encrypt sensitive data.

Answer: C) An encrypted message used to verify the authenticity and integrity of digital documents.
Question 2: What cryptographic technique is used in digital signatures to ensure the authenticity and
integrity of a message? A) Encryption B) Hashing C) Steganography D) Key exchange

Answer: B) Hashing

Question 3: Which of the following statements is true regarding digital signatures? A) Digital
signatures use symmetric encryption techniques. B) Digital signatures guarantee the confidentiality
of the message. C) Digital signatures can only be verified by the sender of the message. D) Digital
signatures provide assurance of the origin and integrity of a message.

Answer: D) Digital signatures provide assurance of the origin and integrity of a message.

Question 4: What is a common strategic policy for passwords? A) Reusing the same password across
multiple accounts. B) Using short and simple passwords. C) Changing passwords frequently. D)
Sharing passwords with colleagues.

Answer: C) Changing passwords frequently.

Question 5: Which of the following is a recommended practice for creating strong passwords? A)
Using common dictionary words as passwords. B) Using personal information such as birthdays or
names. C) Including a combination of uppercase and lowercase letters, numbers, and special
characters. D) Using the same password for all accounts.

Answer: C) Including a combination of uppercase and lowercase letters, numbers, and special
characters.

Question 6: What is the purpose of password complexity requirements in strategic policies? A) To


make it easier for users to remember their passwords. B) To ensure that passwords are easy to
guess. C) To increase the difficulty of unauthorized access by requiring complex passwords. D) To
decrease security by allowing simple passwords.

Answer: C) To increase the difficulty of unauthorized access by requiring complex passwords.

Question 7: What is the principle of least privilege? A) Giving users access to all resources within a
system. B) Granting users only the minimum level of access required to perform their tasks. C)
Allowing users to choose their own access permissions. D) Providing users with unlimited access to
sensitive data.

Answer: B) Granting users only the minimum level of access required to perform their tasks.

Question 8: What is multi-factor authentication? A) Using multiple passwords for the same account.
B) Requiring users to authenticate using different methods, such as passwords and biometrics. C)
Allowing users to access multiple accounts with a single password. D) Using a single authentication
factor for all users.

Answer: B) Requiring users to authenticate using different methods, such as passwords and
biometrics.

Question 9: What is the purpose of password hashing in password management? A) To store


passwords in plain text for easy retrieval. B) To encrypt passwords using reversible encryption
algorithms. C) To convert passwords into a fixed-length string of characters that cannot be reversed.
D) To transmit passwords securely over the internet.

Answer: C) To convert passwords into a fixed-length string of characters that cannot be reversed.
Question 10: Which of the following is an example of a strong password? A) "password123" B)
"123456" C) "P@ssw0rd!" D) "abc123"

Answer: C) "P@ssw0rd!"

Intrusion Detection system (IDS) and Intrusion Prevention System (IPS)

Question 1: What is a digital signature? A) An electronic image of a handwritten signature. B) A


unique identifier used to access online accounts. C) An encrypted message used to verify the
authenticity and integrity of digital documents. D) A password used to encrypt sensitive data.

Answer: C) An encrypted message used to verify the authenticity and integrity of digital documents.

Question 2: What cryptographic technique is used in digital signatures to ensure the authenticity and
integrity of a message? A) Encryption B) Hashing C) Steganography D) Key exchange

Answer: B) Hashing

Question 3: Which of the following statements is true regarding digital signatures? A) Digital
signatures use symmetric encryption techniques. B) Digital signatures guarantee the confidentiality
of the message. C) Digital signatures can only be verified by the sender of the message. D) Digital
signatures provide assurance of the origin and integrity of a message.

Answer: D) Digital signatures provide assurance of the origin and integrity of a message.

Question 4: What is a common strategic policy for passwords? A) Reusing the same password across
multiple accounts. B) Using short and simple passwords. C) Changing passwords frequently. D)
Sharing passwords with colleagues.

Answer: C) Changing passwords frequently.

Question 5: Which of the following is a recommended practice for creating strong passwords? A)
Using common dictionary words as passwords. B) Using personal information such as birthdays or
names. C) Including a combination of uppercase and lowercase letters, numbers, and special
characters. D) Using the same password for all accounts.

Answer: C) Including a combination of uppercase and lowercase letters, numbers, and special
characters.

Question 6: What is the purpose of password complexity requirements in strategic policies? A) To


make it easier for users to remember their passwords. B) To ensure that passwords are easy to
guess. C) To increase the difficulty of unauthorized access by requiring complex passwords. D) To
decrease security by allowing simple passwords.

Answer: C) To increase the difficulty of unauthorized access by requiring complex passwords.

Question 7: What is the principle of least privilege? A) Giving users access to all resources within a
system. B) Granting users only the minimum level of access required to perform their tasks. C)
Allowing users to choose their own access permissions. D) Providing users with unlimited access to
sensitive data.
Answer: B) Granting users only the minimum level of access required to perform their tasks.

Question 8: What is multi-factor authentication? A) Using multiple passwords for the same account.
B) Requiring users to authenticate using different methods, such as passwords and biometrics. C)
Allowing users to access multiple accounts with a single password. D) Using a single authentication
factor for all users.

Answer: B) Requiring users to authenticate using different methods, such as passwords and
biometrics.

Question 9: What is the purpose of password hashing in password management? A) To store


passwords in plain text for easy retrieval. B) To encrypt passwords using reversible encryption
algorithms. C) To convert passwords into a fixed-length string of characters that cannot be reversed.
D) To transmit passwords securely over the internet.

Answer: C) To convert passwords into a fixed-length string of characters that cannot be reversed.

Question 10: Which of the following is an example of a strong password? A) "password123" B)


"123456" C) "P@ssw0rd!" D) "abc123"

Answer: C) "P@ssw0rd!"

You

Intrusion Detection system (IDS) and Intrusion Prevention System (IPS)

ChatGPT

ChatGPT

Sure! Here are some multiple-choice questions (MCQs) related to Intrusion Detection Systems (IDS)
and Intrusion Prevention Systems (IPS), along with their answers:

Question 1: What is the primary function of an Intrusion Detection System (IDS)? A) To prevent
unauthorized access to a network or system. B) To detect and respond to potential security threats
in real-time. C) To encrypt sensitive data during transmission. D) To authenticate users accessing the
network.

Answer: B) To detect and respond to potential security threats in real-time.

Question 2: Which of the following statements accurately describes an Intrusion Prevention System
(IPS)? A) An IPS only identifies security threats but does not take any action to prevent them. B) An
IPS actively monitors network traffic and takes automated actions to block or mitigate security
threats. C) An IPS is primarily used for encrypting data transmitted over a network. D) An IPS focuses
on authenticating users and controlling access to network resources.

Answer: B) An IPS actively monitors network traffic and takes automated actions to block or mitigate
security threats.

Question 3: What is the main difference between an IDS and an IPS? A) An IDS operates in passive
mode, while an IPS operates in active mode. B) An IDS focuses on encryption, while an IPS focuses
on authentication. C) An IDS only identifies security threats, while an IPS takes action to prevent or
mitigate them. D) An IDS is software-based, while an IPS is hardware-based.
Answer: C) An IDS only identifies security threats, while an IPS takes action to prevent or mitigate
them.

Question 4: Which of the following is a common technique used by an IDS to detect potential
security threats? A) Monitoring user authentication logs B) Analyzing network traffic for anomalies
C) Encrypting sensitive data during transmission D) Controlling access to network resources

Answer: B) Analyzing network traffic for anomalies

Question 5: What action does an IPS typically take when it detects a potential security threat? A) It
sends an alert to the network administrator for manual intervention. B) It automatically blocks or
filters network traffic associated with the threat. C) It encrypts sensitive data to prevent
unauthorized access. D) It authenticates users accessing the network.

Answer: B) It automatically blocks or filters network traffic associated with the threat.

Question 6: What term refers to a technique used by an IDS to compare current network traffic
patterns against known attack signatures? A) Anomaly detection B) Signature-based detection C)
Behavior analysis D) Encryption

Answer: B) Signature-based detection

Question 7: Which of the following is an advantage of using an IPS over an IDS? A) An IPS consumes
fewer network resources. B) An IPS is less expensive to implement and maintain. C) An IPS can
automatically respond to security threats without human intervention. D) An IPS is more effective at
identifying potential security threats.

Answer: C) An IPS can automatically respond to security threats without human intervention.

Question 8: What term describes the process of continuously monitoring and analyzing network
traffic for signs of potential security threats? A) Encryption B) Authentication C) Intrusion detection
D) Access control

Answer: C) Intrusion detection

Question 9: Which of the following is a limitation of signature-based detection used by IDS and IPS?
A) It requires extensive computational resources. B) It can only detect known attack patterns. C) It is
ineffective against encrypted traffic. D) It provides real-time analysis of network traffic.

Answer: B) It can only detect known attack patterns.

Question 10: What is the primary goal of both an IDS and an IPS? A) To monitor network
performance B) To prevent all security threats C) To detect and respond to security threats D) To
authenticate users accessing the network

Answer: C) To detect and respond to security threats

Social Media Marketing, Defense tools for social media security

Question 1: What is the primary goal of social media marketing? A) To increase website traffic B) To
boost search engine rankings C) To promote products or services through social media platforms D)
To generate email leads
Answer: C) To promote products or services through social media platforms

Question 2: Which of the following social media platforms is primarily image-based? A) Twitter B)
LinkedIn C) Instagram D) YouTube

Answer: C) Instagram

Question 3: What is the term for paid advertisements that appear on social media platforms? A)
Sponsored posts B) Organic posts C) Viral posts D) Sponsored stories

Answer: A) Sponsored posts

Question 4: What is the key benefit of using social media for marketing purposes? A) Limited
audience reach B) Low engagement rates C) Cost-effective targeting options D) Slow response time

Answer: C) Cost-effective targeting options

Question 5: What term refers to the practice of creating and sharing content on social media
platforms to engage audiences and promote brand awareness? A) Social media advertising B) Social
media optimization C) Social media marketing D) Social media analytics

Answer: C) Social media marketing

Defense Tools for Social Media Security:

Question 6: What is a common defense tool used for social media security? A) Virtual Private
Network (VPN) B) Intrusion Detection System (IDS) C) Firewall D) Social media monitoring software

Answer: D) Social media monitoring software

Question 7: Which of the following is a feature of social media monitoring software? A) Blocking
social media access for employees B) Identifying and analyzing social media threats and
vulnerabilities C) Encrypting social media posts D) Monitoring internet bandwidth usage

Answer: B) Identifying and analyzing social media threats and vulnerabilities

Question 8: What is the purpose of using a VPN for social media security? A) To monitor social media
activity in real-time B) To encrypt data transmitted over social media networks C) To block access to
social media platforms D) To identify potential threats on social media

Answer: B) To encrypt data transmitted over social media networks

Question 9: Which of the following is a benefit of using social media security tools? A) Increased
social media engagement B) Enhanced protection against cyber threats and attacks C) Reduced
visibility of social media posts D) Improved search engine rankings

Answer: B) Enhanced protection against cyber threats and attacks

Question 10: What is the primary goal of social media security tools? A) To increase social media
followers B) To prevent unauthorized access to social media accounts C) To improve social media
advertising campaigns D) To enhance social media analytics

Answer: B) To prevent unauthorized access to social media accounts

Networking, Basic Security for Windows


Question 1: What is the primary goal of social media marketing? A) To increase website traffic B) To
boost search engine rankings C) To promote products or services through social media platforms D)
To generate email leads

Answer: C) To promote products or services through social media platforms

Question 2: Which of the following social media platforms is primarily image-based? A) Twitter B)
LinkedIn C) Instagram D) YouTube

Answer: C) Instagram

Question 3: What is the term for paid advertisements that appear on social media platforms? A)
Sponsored posts B) Organic posts C) Viral posts D) Sponsored stories

Answer: A) Sponsored posts

Question 4: What is the key benefit of using social media for marketing purposes? A) Limited
audience reach B) Low engagement rates C) Cost-effective targeting options D) Slow response time

Answer: C) Cost-effective targeting options

Question 5: What term refers to the practice of creating and sharing content on social media
platforms to engage audiences and promote brand awareness? A) Social media advertising B) Social
media optimization C) Social media marketing D) Social media analytics

Answer: C) Social media marketing

Defense Tools for Social Media Security:

Question 6: What is a common defense tool used for social media security? A) Virtual Private
Network (VPN) B) Intrusion Detection System (IDS) C) Firewall D) Social media monitoring software

Answer: D) Social media monitoring software

Question 7: Which of the following is a feature of social media monitoring software? A) Blocking
social media access for employees B) Identifying and analyzing social media threats and
vulnerabilities C) Encrypting social media posts D) Monitoring internet bandwidth usage

Answer: B) Identifying and analyzing social media threats and vulnerabilities

Question 8: What is the purpose of using a VPN for social media security? A) To monitor social media
activity in real-time B) To encrypt data transmitted over social media networks C) To block access to
social media platforms D) To identify potential threats on social media

Answer: B) To encrypt data transmitted over social media networks

Question 9: Which of the following is a benefit of using social media security tools? A) Increased
social media engagement B) Enhanced protection against cyber threats and attacks C) Reduced
visibility of social media posts D) Improved search engine rankings

Answer: B) Enhanced protection against cyber threats and attacks

Question 10: What is the primary goal of social media security tools? A) To increase social media
followers B) To prevent unauthorized access to social media accounts C) To improve social media
advertising campaigns D) To enhance social media analytics

Answer: B) To prevent unauthorized access to social media accounts


You

Networking, Basic Security for Windows

ChatGPT

ChatGPT

Certainly! Here are some multiple-choice questions (MCQs) related to Networking and Basic Security
for Windows, along with their answers:

Networking:

Question 1: What is a network? A) A group of interconnected computers and devices B) A single


computer system C) A software application D) A peripheral device

Answer: A) A group of interconnected computers and devices

Question 2: What is the purpose of a router in a computer network? A) To store and manage data
files B) To connect devices within the same network C) To provide wireless access to the internet D)
To forward data packets between different networks

Answer: D) To forward data packets between different networks

Question 3: What is an IP address? A) A physical address assigned to a network interface card (NIC)
B) A unique identifier for a website C) A protocol used for secure data transmission D) A type of
network cable

Answer: A) A physical address assigned to a network interface card (NIC)

Question 4: Which of the following is a characteristic of a LAN (Local Area Network)? A) Covers a
large geographical area B) Connects devices within a single building or campus C) Provides internet
access to multiple users D) Connects devices across different cities or countries

Answer: B) Connects devices within a single building or campus

Question 5: What is the purpose of a firewall in computer networking? A) To provide wireless access
to the internet B) To filter incoming and outgoing network traffic based on predefined security rules
C) To manage email communication D) To store and manage data files

Answer: B) To filter incoming and outgoing network traffic based on predefined security rules

Basic Security for Windows:

Question 6: What is antivirus software? A) Software used to create backups of data files B) Software
used to protect against malware infections C) Software used for word processing D) Software used
to manage email communication

Answer: B) Software used to protect against malware infections

Question 7: Which of the following is a recommended practice for securing a Windows computer? A)
Disabling automatic updates B) Using weak passwords C) Installing security patches and updates
regularly D) Sharing passwords with colleagues

Answer: C) Installing security patches and updates regularly


Question 8: What is the purpose of user account control (UAC) in Windows? A) To manage network
connections B) To encrypt data files C) To restrict access to certain programs and settings D) To
monitor internet traffic

Answer: C) To restrict access to certain programs and settings

Question 9: What is the function of Windows Defender? A) To manage network connections B) To


provide wireless access to the internet C) To protect against malware and other security threats D)
To manage email communication

Answer: C) To protect against malware and other security threats

Question 10: Which of the following is a feature of Windows Firewall? A) Providing wireless access to
the internet B) Filtering incoming and outgoing network traffic C) Encrypting data files D) Managing
email communication

Answer: B) Filtering incoming and outgoing network traffic

Top of Form

Mobile Security, Wi-Fi Security

Question 1: What is a network? A) A group of interconnected computers and devices B) A single


computer system C) A software application D) A peripheral device

Answer: A) A group of interconnected computers and devices

Question 2: What is the purpose of a router in a computer network? A) To store and manage data
files B) To connect devices within the same network C) To provide wireless access to the internet D)
To forward data packets between different networks

Answer: D) To forward data packets between different networks

Question 3: What is an IP address? A) A physical address assigned to a network interface card (NIC)
B) A unique identifier for a website C) A protocol used for secure data transmission D) A type of
network cable

Answer: A) A physical address assigned to a network interface card (NIC)

Question 4: Which of the following is a characteristic of a LAN (Local Area Network)? A) Covers a
large geographical area B) Connects devices within a single building or campus C) Provides internet
access to multiple users D) Connects devices across different cities or countries

Answer: B) Connects devices within a single building or campus

Question 5: What is the purpose of a firewall in computer networking? A) To provide wireless access
to the internet B) To filter incoming and outgoing network traffic based on predefined security rules
C) To manage email communication D) To store and manage data files

Answer: B) To filter incoming and outgoing network traffic based on predefined security rules

Basic Security for Windows:


Question 6: What is antivirus software? A) Software used to create backups of data files B) Software
used to protect against malware infections C) Software used for word processing D) Software used
to manage email communication

Answer: B) Software used to protect against malware infections

Question 7: Which of the following is a recommended practice for securing a Windows computer? A)
Disabling automatic updates B) Using weak passwords C) Installing security patches and updates
regularly D) Sharing passwords with colleagues

Answer: C) Installing security patches and updates regularly

Question 8: What is the purpose of user account control (UAC) in Windows? A) To manage network
connections B) To encrypt data files C) To restrict access to certain programs and settings D) To
monitor internet traffic

Answer: C) To restrict access to certain programs and settings

Question 9: What is the function of Windows Defender? A) To manage network connections B) To


provide wireless access to the internet C) To protect against malware and other security threats D)
To manage email communication

Answer: C) To protect against malware and other security threats

Question 10: Which of the following is a feature of Windows Firewall? A) Providing wireless access to
the internet B) Filtering incoming and outgoing network traffic C) Encrypting data files D) Managing
email communication

Answer: B) Filtering incoming and outgoing network traffic

You

Mobile Security, Wi-Fi Security

ChatGPT

ChatGPT

Certainly! Here are some multiple-choice questions (MCQs) related to Mobile Security and Wi-Fi
Security, along with their answers:

Mobile Security:

Question 1: What is mobile security? A) Protection against physical damage to mobile devices B)
Security measures to protect data stored on mobile devices and transmitted over networks C)
Ensuring high-speed internet access on mobile devices D) Enhancing battery life of mobile devices

Answer: B) Security measures to protect data stored on mobile devices and transmitted over
networks

Question 2: Which of the following is a common threat to mobile security? A) Printer vulnerabilities
B) Phishing attacks C) Router configurations D) Mainframe security

Answer: B) Phishing attacks


Question 3: What is a common security measure used to protect mobile devices? A) Encryption B)
Defragmentation C) Overclocking D) Disk Cleanup

Answer: A) Encryption

Question 4: What is the purpose of a mobile device management (MDM) solution? A) To monitor
mobile device battery levels B) To remotely manage and secure mobile devices within an
organization C) To enhance mobile device performance D) To provide mobile network coverage

Answer: B) To remotely manage and secure mobile devices within an organization

Question 5: What is the term for malicious software specifically designed to target mobile devices?
A) Adware B) Spyware C) Ransomware D) Mobile malware

Answer: D) Mobile malware

Wi-Fi Security:

Question 6: What is Wi-Fi security? A) Securing physical access points to Wi-Fi networks B)
Protecting data transmitted over Wi-Fi networks from unauthorized access C) Increasing Wi-Fi signal
strength D) Preventing interference from other Wi-Fi networks

Answer: B) Protecting data transmitted over Wi-Fi networks from unauthorized access

Question 7: Which of the following is a common security protocol used for securing Wi-Fi networks?
A) SSL (Secure Sockets Layer) B) FTP (File Transfer Protocol) C) WPA2 (Wi-Fi Protected Access 2) D)
HTTP (Hypertext Transfer Protocol)

Answer: C) WPA2 (Wi-Fi Protected Access 2)

Question 8: What is the purpose of Wi-Fi encryption? A) To increase Wi-Fi signal strength B) To
secure data transmitted over Wi-Fi networks from eavesdropping C) To block unauthorized devices
from accessing the Wi-Fi network D) To manage Wi-Fi access points

Answer: B) To secure data transmitted over Wi-Fi networks from eavesdropping

Question 9: What is the term for a technique used to crack Wi-Fi passwords by trying every possible
combination until the correct one is found? A) Brute force attack B) Phishing attack C) Denial-of-
Service (DoS) attack D) Man-in-the-Middle (MitM) attack

Answer: A) Brute force attack

Question 10: What is the purpose of changing the default SSID and password on a Wi-Fi router? A)
To increase Wi-Fi signal strength B) To enhance network performance C) To prevent unauthorized
access to the Wi-Fi network D) To improve internet speed

Answer: C) To prevent unauthorized access to the Wi-Fi network

Cyber Security Acts and Law in India


Here's a multiple-choice question (MCQ) related to Cyber Security Acts and Laws in India:

Question: Which of the following acts is the primary legislation governing cyber activities and
electronic transactions in India? A) Indian Penal Code, 1860 B) Banking Regulation Act, 1949 C)
Information Technology Act, 2000 D) Payment and Settlement Systems Act, 2007

Answer: C) Information Technology Act, 2000

Concept of HTTP and HTTPS:

Question: Which of the following statements accurately describes the difference between HTTP and
HTTPS?

A) HTTP is a protocol used for secure data transmission, while HTTPS is used for regular data
transmission. B) HTTP operates on port 443, while HTTPS operates on port 80. C) HTTPS uses
encryption to secure data transmission, while HTTP does not. D) HTTP is faster than HTTPS due to
the absence of encryption.

Answer: C) HTTPS uses encryption to secure data transmission, while HTTP does not.

Explanation: HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP (Hypertext Transfer
Protocol) with added security features. The key difference between the two is that HTTPS uses
encryption (usually SSL/TLS) to secure data transmission over the internet, ensuring the
confidentiality and integrity of the data. On the other hand, HTTP transmits data in plaintext, making
it vulnerable to interception and tampering.

Basics of E-commerce and M-commerce and its Components

Question 1: What is E-commerce? A) The use of mobile devices for online shopping B) The buying
and selling of goods and services over the internet C) Electronic mail communication between
businesses D) An online platform for social networking

Answer: B) The buying and selling of goods and services over the internet

Question 2: Which of the following is a component of an E-commerce platform? A) Bluetooth


connectivity B) Product catalog C) GPS navigation D) Music player

Answer: B) Product catalog

Question 3: What is M-commerce? A) The use of electronic devices for mobile banking B) The use of
mobile devices for online shopping and transactions C) The sending and receiving of multimedia
messages on mobile phones D) Mobile gaming and entertainment

Answer: B) The use of mobile devices for online shopping and transactions

Question 4: Which of the following is a characteristic of M-commerce? A) Limited accessibility B)


Reliance on traditional brick-and-mortar stores C) Portability and convenience D) Slow transaction
processing

Answer: C) Portability and convenience


Question 5: What is a component of M-commerce applications? A) Desktop computers B) Cash
registers C) Mobile payment systems D) Television screens

Answer: C) Mobile payment systems

These questions cover the basics of E-commerce and M-commerce, including their definitions,
components, and characteristics.

Internet and Mobile Banking Security, Rules of usage of Debit and Credit Card, Guidelines of UPI
Security

Question 1: What is a common security measure used in Internet and Mobile Banking? A) Sharing
passwords with friends and family B) Using public Wi-Fi networks for transactions C) Two-factor
authentication (2FA) D) Writing down passwords on a piece of paper

Answer: C) Two-factor authentication (2FA)

Question 2: Which of the following is a best practice for ensuring security in Internet and Mobile
Banking? A) Sharing login credentials with customer support representatives B) Disabling security
features for faster transactions C) Regularly updating passwords and PINs D) Ignoring security alerts
and warnings

Answer: C) Regularly updating passwords and PINs

Question 3: What is the purpose of encryption in Internet and Mobile Banking? A) To make
transactions faster B) To protect sensitive data from unauthorized access C) To display
advertisements D) To track user behavior

Answer: B) To protect sensitive data from unauthorized access

Rules of Usage of Debit and Credit Cards:

Question 4: What is a common security rule for using Debit and Credit Cards? A) Sharing card details
over email or social media B) Using public computers for online transactions C) Memorizing PINs and
not writing them down D) Providing card information to unknown websites

Answer: C) Memorizing PINs and not writing them down

Question 5: What should you do if your Debit or Credit Card is lost or stolen? A) Wait for it to
reappear B) Report it to the bank immediately C) Keep using it until the bank contacts you D) Share
the card details on social media for help

Answer: B) Report it to the bank immediately

Guidelines of UPI (Unified Payments Interface) Security:

Question 6: What is UPI (Unified Payments Interface)? A) A social media platform B) A mobile
gaming app C) A payment system that enables instant fund transfers between bank accounts D) A
messaging app

Answer: C) A payment system that enables instant fund transfers between bank accounts

Question 7: What is a UPI PIN used for? A) Social media authentication B) Mobile gaming C) Making
secure transactions on UPI platforms D) Unlocking smartphones
Answer: C) Making secure transactions on UPI platforms

Question 8: What is a common security measure for UPI transactions? A) Sharing UPI PIN with others
B) Using unsecured Wi-Fi networks C) Verifying transaction details before authorizing D) Ignoring
transaction alerts

Answer: C) Verifying transaction details before authorizing

Question 9: What should you do if you receive unauthorized UPI transactions? A) Ignore them B)
Report them to your bank immediately C) Share your UPI PIN with others D) Post about it on social
media

Answer: B) Report them to your bank immediately

Question 10: What is the purpose of setting transaction limits on UPI platforms? A) To encourage
unlimited spending B) To restrict the amount of money that can be transferred in a single
transaction C) To share personal information with others D) To increase the risk of fraud

Answer: B) To restrict the amount of money that can be transferred in a single transaction

These questions cover various aspects of Internet and Mobile Banking Security, Rules of Usage of
Debit and Credit Cards, and Guidelines of UPI, emphasizing security measures and best practices for
safe transactions.

Top of Form

RBI guidelines for digital payments and Customer Protection.

Question: What does RBI stand for in the context of digital payments?

A) Reserve Bank of India

B) Regional Banking Institution

C) Retail Banking Institute

D) Regulatory Banking Initiative

Answer: A) Reserve Bank of India

Question: What is the primary objective of RBI guidelines for digital payments?

A) To encourage fraud and malpractice

B) To ensure customer protection and security

C) To discourage digital transactions

D) To limit access to digital payment services

Answer: B) To ensure customer protection and security

Question: What does RBI mandate regarding customer data protection in digital payments?

A) Sharing customer data freely with third parties

B) Storing customer data on unsecured servers


C) Ensuring the security and confidentiality of customer data

D) Selling customer data to advertisers

Answer: C) Ensuring the security and confidentiality of customer data

Question: Which of the following is NOT a common feature of RBI guidelines for digital payments?

A) Two-factor authentication

B) Transaction limits

C) Encryption of sensitive data

D) Sharing of OTPs (One-Time Passwords) on social media

Answer: D) Sharing of OTPs (One-Time Passwords) on social media

Question: What does RBI recommend regarding unauthorized transactions in digital payments?

A) Ignoring them as they are insignificant

B) Reporting them to the bank immediately

C) Sharing OTPs with friends for assistance

D) Posting about them on social media

Answer: B) Reporting them to the bank immediately

Question: What is the purpose of transaction alerts as per RBI guidelines?

A) To notify customers of successful transactions

B) To share personal information with third parties

C) To verify customer identities

D) To increase the risk of fraud

Answer: A) To notify customers of successful transactions

Question: What does RBI recommend regarding customer grievance redressal in digital payments?

A) Ignoring customer complaints

B) Addressing customer grievances promptly and effectively

C) Delaying resolution of customer complaints

D) Rejecting customer complaints without investigation

Answer: B) Addressing customer grievances promptly and effectively

Question: What should customers do if they suspect fraudulent activity in their digital payments
account?

A) Share their account details with strangers

B) Report the suspicious activity to the bank immediately


C) Ignore it and hope it resolves itself

D) Post about it on social media

Answer: B) Report the suspicious activity to the bank immediately

Question: What role does RBI play in regulating digital payment service providers?

A) No role; it leaves regulation to individual service providers

B) Providing guidelines and regulations to ensure customer protection

C) Encouraging fraud and malpractice

D) Creating obstacles for digital payment service providers

Answer: B) Providing guidelines and regulations to ensure customer protection

Question: What is the significance of RBI guidelines for digital payments?

A) They ensure the convenience of digital transactions at all costs

B) They prioritize customer protection and security in digital transactions

C) They discourage the adoption of digital payment methods

D) They encourage fraudulent activities in digital payments

Answer: B) They prioritize customer protection and security in digital transactions

You might also like