Introduction of Cyber Security Vac MCQ Question Pattern
Introduction of Cyber Security Vac MCQ Question Pattern
Sub: cybersecurity
Department of Computer Science
Prof: Tutan Ghosh
Mob: 9836989900
1. which of the following is a common method used by cyber attackers to gain unauthorized access
to computer systems?
Answer: C) An attack that attempts to trick individuals into revealing sensitive information
3. Which of the following is a fundamental principle of cybersecurity that emphasizes limiting access
to authorized users only?
4. What type of cyber attack involves overwhelming a computer system or network with a flood of
data packets in order to disrupt its normal functioning?
6. Which of the following statements accurately describes the concept of "cyber resilience"?
A) Cyber resilience refers to the ability of a system to resist cyber attacks without any impact. B)
Cyber resilience is the practice of building systems and processes that can quickly recover from cyber
attacks and adapt to new threats. C) Cyber resilience involves preventing all cyber attacks through
robust security measures. D) Cyber resilience is only relevant for large organizations and not for
individuals or small businesses.
Answer: B) Cyber resilience is the practice of building systems and processes that can quickly recover
from cyber attacks and adapt to new threats.
7. What is the primary purpose of a Virtual Private Network (VPN) in the context of cybersecurity?
A) To encrypt sensitive data stored on a local computer. B) To provide secure and encrypted
communication over a public network, such as the internet. C) To detect and remove malware from
a computer system. D) To prevent physical access to computer hardware.
Answer: B) To provide secure and encrypted communication over a public network, such as the
internet.
A) It is a tool used to encrypt sensitive data. B) It is a device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. C) It is a type of
malware designed to steal sensitive information. D) It is a technique used to exploit vulnerabilities in
computer systems.
Answer: B) It is a device or software that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
A) Installing antivirus software on a computer system. B) Encrypting sensitive files to protect them
from unauthorized access. C) Sending an email pretending to be from a trusted source, asking for
login credentials. D) Configuring a firewall to block malicious incoming traffic.
Answer: C) Sending an email pretending to be from a trusted source, asking for login credentials.
11. What term is used to describe a cybersecurity attack where an attacker intercepts
communication between two parties and may alter or eavesdrop on the communication?
12. Which of the following cybersecurity measures is used to prevent unauthorized access by users
or software to a network or system?
Answer: C) Authentication
13. What term describes a cybersecurity attack where an attacker sends a large volume of traffic to a
website or server, causing it to become unavailable to legitimate users?
A) To detect and remove malware from a system. B) To prevent unauthorized access to sensitive
data by encrypting it. C) To monitor network traffic for suspicious activity. D) To provide secure
authentication for users.
15. Which of the following is a common method used to protect sensitive information transmitted
over the internet?
Answer: D) Encryption
16. What term is used to describe a cybersecurity attack where an attacker sends deceptive emails
or messages to trick individuals into revealing sensitive information, such as passwords or credit card
numbers?
Answer: C) Phishing
17. What is the term for a cybersecurity attack that involves an attacker gaining unauthorized access
to a system by exploiting vulnerabilities in software or hardware?
Answer: D) Exploit
18. What is the purpose of a CAPTCHA in cybersecurity?
A) To encrypt sensitive data during transmission. B) To detect and remove malware from a system.
C) To authenticate users based on their biometric data. D) To distinguish between human users and
automated bots.
19. What term refers to a cybersecurity attack where an attacker gains unauthorized access to a
system by tricking individuals into revealing their login credentials?
Answer: C) Phishing
20. Which cybersecurity measure is designed to detect and prevent unauthorized access to
computer systems or networks by analyzing incoming and outgoing traffic?
21: What term describes a cybersecurity attack that involves an attacker pretending to be someone
else in order to gain unauthorized access to a system or network?
Answer: A) Spoofing
Answer: C) Firewall
23: What does the acronym "DDoS" stand for in the context of cybersecurity?
24: Which cybersecurity measure involves converting plaintext into ciphertext to protect sensitive
information from unauthorized access?
Answer: C) Encryption
25: What is the term for a software vulnerability that is unknown to the software developer and
typically exploited by attackers before a patch is available?
26: What type of attack involves an attacker intercepting and possibly altering communication
between two parties without their knowledge?
28: What is the term for a cybersecurity attack that involves an attacker gaining access to a system
by exploiting software vulnerabilities?
Answer: C) Exploit
29: Which cybersecurity measure is designed to identify, assess, and prioritize vulnerabilities in
computer systems and software?
30: What term refers to the practice of tricking individuals into divulging sensitive information or
performing actions that compromise security?
32: Which of the following best describes the term "firewall" in the context of cybersecurity?
A) A device or software that monitors and controls incoming and outgoing network traffic based on
predetermined security rules. B) A type of malware that spreads through email attachments and
encrypts files on a victim's computer. C) A technique used by attackers to gain unauthorized access
to a system by impersonating a legitimate entity. D) A physical barrier installed around computer
systems to prevent physical access by unauthorized individuals.
Answer: A) A device or software that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
Answer: C) To detect and remove malicious software (malware) from computer systems.
34: What term refers to a type of cyber attack in which an attacker encrypts files on a victim's
computer and demands a ransom for their release?
Answer: C) Ransomware
A) Username and password B) Security token C) Fingerprint scanner D) One-time password (OTP)
36: What cybersecurity measure is designed to monitor network traffic for suspicious activities or
anomalies?
A) To detect and remove malware from network traffic. B) To encrypt sensitive data stored on local
devices. C) To provide secure and private communication over public networks. D) To authenticate
users accessing network resources.
38: What term refers to a cybersecurity attack that involves an attacker sending deceptive emails or
messages to trick individuals into revealing sensitive information?
Answer: B) Phishing
A) To identify and patch software vulnerabilities. B) To monitor network traffic for suspicious
activities. C) To simulate cyber attacks to assess the security of systems and networks. D) To encrypt
sensitive data during transmission.
Answer: C) To simulate cyber attacks to assess the security of systems and networks.
40: Which of the following best describes the term "social engineering" in the context of
cybersecurity?
A) A technique used to prevent unauthorized access to computer systems. B) A method of
encrypting sensitive data during transmission. C) The practice of tricking individuals into divulging
confidential information or performing actions that compromise security. D) A type of malware that
spreads through email attachments and encrypts files on a victim's computer.
Answer: C) The practice of tricking individuals into divulging confidential information or performing
actions that compromise security.
41: What term describes a cybersecurity attack that involves an attacker gaining unauthorized access
to a system by exploiting vulnerabilities in software or hardware?
Answer: C) Exploit
42: Which of the following cybersecurity measures is used to prevent unauthorized access by users
or software to a network or system?
Answer: A) Authentication
43: What is the term for a cybersecurity attack that involves an attacker intercepting communication
between two parties and may alter or eavesdrop on the communication?
44: What cybersecurity measure is designed to detect and prevent unauthorized access to computer
systems or networks by analyzing incoming and outgoing traffic?
Answer: D) Firewall
45: What term refers to a cybersecurity attack where an attacker sends deceptive emails or
messages to trick individuals into revealing sensitive information?
Answer: B) Phishing
46: Which cybersecurity measure involves converting plaintext into ciphertext to protect sensitive
information from unauthorized access?
Answer: C) Encryption
A) To detect and remove malicious software (malware) from computer systems. B) To authenticate
users accessing computer systems. C) To encrypt sensitive data during transmission. D) To prevent
unauthorized access to computer systems.
Answer: A) To detect and remove malicious software (malware) from computer systems.
48: What is the term for a software vulnerability that is unknown to the software developer and
typically exploited by attackers before a patch is available?
49: What type of attack involves an attacker intercepting and possibly altering communication
between two parties without their knowledge?
51: What cybersecurity measure is designed to identify, assess, and prioritize vulnerabilities in
computer systems and software?
52: What term refers to a type of cyber attack in which an attacker encrypts files on a victim's
computer and demands a ransom for their release?
Answer: C) Ransomware
A) Username and password B) Fingerprint scanner C) Security token D) One-time password (OTP)
A) To provide secure and private communication over public networks. B) To authenticate users
accessing network resources. C) To detect and remove malware from network traffic. D) To encrypt
sensitive data stored on local devices.
55: What term refers to a cybersecurity attack that involves an attacker sending deceptive emails or
messages to trick individuals into revealing sensitive information?
Answer: B) Phishing
Cyber Space & Crime:
Question 1: What is cybercrime? A) Crime committed using a computer or the internet. B) Crime
committed in cyberspace. C) Crime involving physical violence. D) Crime committed using traditional
methods.
Question 4: Which of the following is a cybersecurity challenge associated with the Internet of
Things (IoT)? A) Limited connectivity B) Lack of interoperability C) Decreased data generation D)
Reduced energy consumption
Question 5: What term describes the use of computer technology to disrupt the normal functioning
of a system or network? A) Phishing B) Social engineering C) Cyber attack D) Encryption
Question 7: What is the purpose of cyber law? A) To regulate the use of social media platforms B) To
prevent the spread of fake news C) To establish rules and regulations for activities conducted in
cyberspace D) To promote online anonymity
Question 8: What term refers to the unauthorized access, use, disclosure, disruption, modification,
or destruction of electronic information? A) Cyberwarfare B) Cybersecurity C) Cyber espionage D)
Cybercrime
Answer: D) Cybercrime
Question 9: What is the primary aim of cyberterrorism? A) To promote peace and harmony in
cyberspace B) To engage in lawful online activities C) To cause fear, panic, and disruption by
targeting computer networks or systems D) To enhance cybersecurity measures globally
Answer: C) To cause fear, panic, and disruption by targeting computer networks or systems
Question 10: Which of the following is an example of cyber espionage? A) Distributing viruses to
disrupt computer networks B) Stealing sensitive information from government agencies or
corporations C) Conducting lawful online transactions D) Participating in online gaming communities
Question 1: What is the primary goal of information security? A) To ensure the confidentiality,
integrity, and availability of information. B) To maximize the use of information resources. C) To
restrict access to information. D) To delete unnecessary information.
Question 2: Which of the following is an example of a data security breach? A) Regular data backups
B) Implementing encryption protocols C) Unauthorized access to sensitive information D) Routine
software updates
Question 3: What does the term "confidentiality" refer to in information security? A) Ensuring that
information is accurate and reliable. B) Protecting information from unauthorized access and
disclosure. C) Making information readily available to authorized users. D) Encrypting information for
secure transmission.
Question 4: Which of the following is an example of a technical control used to enhance data
security? A) Security awareness training for employees B) Access control mechanisms C) Data
classification policies D) Password policies
Question 5: What is the purpose of encryption in data security? A) To prevent data loss B) To restrict
access to data C) To ensure data availability D) To protect data confidentiality
Question 6: What term describes the process of verifying that a user is who they claim to be? A)
Authorization B) Authentication C) Encryption D) Decryption
Answer: B) Authentication
Question 7: What does the term "integrity" mean in the context of data security? A) Protecting data
from unauthorized access and disclosure. B) Ensuring that data is accurate and reliable. C) Encrypting
data for secure transmission. D) Making data readily available to authorized users.
Question 9: What term refers to the process of identifying, categorizing, and classifying data based
on its sensitivity? A) Data encryption B) Data backup C) Data classification D) Data anonymization
Question 10: What is the purpose of data backup in data security? A) To prevent unauthorized
access to data B) To ensure data availability in case of loss or corruption C) To classify data based on
its sensitivity D) To authenticate users accessing data
Question 1: What is ethical hacking? A) Unauthorized intrusion into computer systems for malicious
purposes. B) Testing computer systems for vulnerabilities with permission to improve security. C)
Creating viruses and malware to disrupt computer networks. D) Stealing sensitive information from
computer systems.
Answer: B) Testing computer systems for vulnerabilities with permission to improve security.
Question 2: What is the primary goal of an ethical hacker? A) To breach security defenses for
personal gain. B) To identify and fix security vulnerabilities in computer systems. C) To steal
confidential information from computer networks. D) To disrupt the normal functioning of computer
systems.
Question 3: What ethical principle guides the practice of ethical hacking? A) Honesty B) Loyalty C)
Confidentiality D) Integrity
Answer: D) Integrity
Question 4: Which of the following is an example of an ethical hacking technique? A) Brute force
attack without permission B) SQL injection without authorization C) Penetration testing with consent
D) Social engineering to trick individuals into revealing passwords
Question 5: What term refers to the process of identifying and fixing security vulnerabilities in
computer systems? A) Cyber warfare B) Cybercrime C) Penetration testing D) Patch management
Question 6: What ethical principle emphasizes the importance of respecting the privacy and
confidentiality of individuals' data? A) Integrity B) Confidentiality C) Availability D) Accountability
Answer: B) Confidentiality
Question 7: Which of the following is an example of an ethical consideration in cybersecurity? A)
Exploiting vulnerabilities without authorization B) Honoring user privacy and confidentiality C)
Ignoring security patches for software vulnerabilities D) Using malware to disrupt computer
networks
Question 8: What is the purpose of cyber laws? A) To promote hacking activities B) To regulate the
ethical use of technology and protect individuals' rights C) To encourage cyber warfare D) To restrict
internet access
Answer: B) To regulate the ethical use of technology and protect individuals' rights
Question 9: Which of the following is a key aspect of cyber laws? A) Promoting unauthorized access
to computer systems B) Protecting intellectual property rights C) Encouraging cyberbullying D)
Facilitating cyber espionage
Question 10: What term refers to the legal and ethical guidelines that govern the use of technology
and the internet? A) Cybercrime laws B) Cybersecurity regulations C) Cyber ethics D) Cyber warfare
treaties
Question 1: What is a computer virus? A) A type of malware that spreads over a network without
user intervention. B) Malicious software that hides inside legitimate programs and replicates itself.
C) A program that monitors user activity and collects sensitive information. D) Software designed to
gain unauthorized access to computer systems.
Answer: B) Malicious software that hides inside legitimate programs and replicates itself.
Question 2: What characteristic distinguishes a computer worm from a computer virus? A) A worm
requires human intervention to spread, while a virus spreads automatically. B) A worm spreads by
attaching itself to executable files, while a virus spreads independently. C) A worm does not require
a host program to spread, while a virus does. D) A worm infects the boot sector of a hard drive,
while a virus infects files.
Answer: C) A worm does not require a host program to spread, while a virus does.
Question 3: What is spyware? A) Malicious software that deletes or modifies data on a computer
system. B) Software that monitors user activity and collects sensitive information without the user's
knowledge. C) Malware that spreads rapidly over a network, causing disruption. D) A type of virus
that disguises itself as a legitimate program.
Answer: B) Software that monitors user activity and collects sensitive information without the user's
knowledge.
Question 4: Which of the following is a characteristic of a Trojan horse? A) It replicates itself and
spreads to other computers. B) It encrypts files and demands a ransom for their release. C) It
disguises itself as a legitimate program to deceive users. D) It deletes or modifies data on a computer
system.
Question 5: How does a Trojan horse typically enter a computer system? A) By exploiting
vulnerabilities in the operating system. B) By spreading over a network without user intervention. C)
By attaching itself to email attachments or downloads. D) By infecting executable files on the hard
drive.
Question 6: Which type of malware is designed to encrypt files on a victim's computer and demand
payment for their decryption? A) Virus B) Worm C) Spyware D) Ransomware
Answer: D) Ransomware
Question 7: What is the primary purpose of a keylogger? A) To delete or modify data on a computer
system. B) To monitor user activity and collect keystrokes, including passwords and sensitive
information. C) To replicate itself and spread to other computers. D) To disguise itself as a legitimate
program to deceive users.
Answer: B) To monitor user activity and collect keystrokes, including passwords and sensitive
information.
Question 8: What is the main difference between a virus and a worm? A) A virus requires human
intervention to spread, while a worm spreads automatically. B) A virus infects files, while a worm
does not require a host program to spread. C) A virus encrypts files and demands ransom, while a
worm monitors user activity. D) A virus disguises itself as a legitimate program, while a worm deletes
or modifies data.
Answer: B) A virus infects files, while a worm does not require a host program to spread.
Question 9: Which of the following is a characteristic of a rootkit? A) It monitors user activity and
collects sensitive information. B) It spreads rapidly over a network, causing disruption. C) It modifies
or replaces system files to evade detection and gain privileged access. D) It encrypts files on a
computer system and demands payment for their decryption.
Answer: C) It modifies or replaces system files to evade detection and gain privileged access.
Question 10: What term refers to a type of malware that presents itself as a legitimate program but
performs malicious activities in the background? A) Virus B) Worm C) Spyware D) Trojan horse
Answer: C) An encrypted message used to verify the authenticity and integrity of digital documents.
Question 2: What cryptographic technique is used in digital signatures to ensure the authenticity and
integrity of a message? A) Encryption B) Hashing C) Steganography D) Key exchange
Answer: B) Hashing
Question 3: Which of the following statements is true regarding digital signatures? A) Digital
signatures use symmetric encryption techniques. B) Digital signatures guarantee the confidentiality
of the message. C) Digital signatures can only be verified by the sender of the message. D) Digital
signatures provide assurance of the origin and integrity of a message.
Answer: D) Digital signatures provide assurance of the origin and integrity of a message.
Question 4: What is a common strategic policy for passwords? A) Reusing the same password across
multiple accounts. B) Using short and simple passwords. C) Changing passwords frequently. D)
Sharing passwords with colleagues.
Question 5: Which of the following is a recommended practice for creating strong passwords? A)
Using common dictionary words as passwords. B) Using personal information such as birthdays or
names. C) Including a combination of uppercase and lowercase letters, numbers, and special
characters. D) Using the same password for all accounts.
Answer: C) Including a combination of uppercase and lowercase letters, numbers, and special
characters.
Question 7: What is the principle of least privilege? A) Giving users access to all resources within a
system. B) Granting users only the minimum level of access required to perform their tasks. C)
Allowing users to choose their own access permissions. D) Providing users with unlimited access to
sensitive data.
Answer: B) Granting users only the minimum level of access required to perform their tasks.
Question 8: What is multi-factor authentication? A) Using multiple passwords for the same account.
B) Requiring users to authenticate using different methods, such as passwords and biometrics. C)
Allowing users to access multiple accounts with a single password. D) Using a single authentication
factor for all users.
Answer: B) Requiring users to authenticate using different methods, such as passwords and
biometrics.
Answer: C) To convert passwords into a fixed-length string of characters that cannot be reversed.
Question 10: Which of the following is an example of a strong password? A) "password123" B)
"123456" C) "P@ssw0rd!" D) "abc123"
Answer: C) "P@ssw0rd!"
Answer: C) An encrypted message used to verify the authenticity and integrity of digital documents.
Question 2: What cryptographic technique is used in digital signatures to ensure the authenticity and
integrity of a message? A) Encryption B) Hashing C) Steganography D) Key exchange
Answer: B) Hashing
Question 3: Which of the following statements is true regarding digital signatures? A) Digital
signatures use symmetric encryption techniques. B) Digital signatures guarantee the confidentiality
of the message. C) Digital signatures can only be verified by the sender of the message. D) Digital
signatures provide assurance of the origin and integrity of a message.
Answer: D) Digital signatures provide assurance of the origin and integrity of a message.
Question 4: What is a common strategic policy for passwords? A) Reusing the same password across
multiple accounts. B) Using short and simple passwords. C) Changing passwords frequently. D)
Sharing passwords with colleagues.
Question 5: Which of the following is a recommended practice for creating strong passwords? A)
Using common dictionary words as passwords. B) Using personal information such as birthdays or
names. C) Including a combination of uppercase and lowercase letters, numbers, and special
characters. D) Using the same password for all accounts.
Answer: C) Including a combination of uppercase and lowercase letters, numbers, and special
characters.
Question 7: What is the principle of least privilege? A) Giving users access to all resources within a
system. B) Granting users only the minimum level of access required to perform their tasks. C)
Allowing users to choose their own access permissions. D) Providing users with unlimited access to
sensitive data.
Answer: B) Granting users only the minimum level of access required to perform their tasks.
Question 8: What is multi-factor authentication? A) Using multiple passwords for the same account.
B) Requiring users to authenticate using different methods, such as passwords and biometrics. C)
Allowing users to access multiple accounts with a single password. D) Using a single authentication
factor for all users.
Answer: B) Requiring users to authenticate using different methods, such as passwords and
biometrics.
Answer: C) To convert passwords into a fixed-length string of characters that cannot be reversed.
Answer: C) "P@ssw0rd!"
You
ChatGPT
ChatGPT
Sure! Here are some multiple-choice questions (MCQs) related to Intrusion Detection Systems (IDS)
and Intrusion Prevention Systems (IPS), along with their answers:
Question 1: What is the primary function of an Intrusion Detection System (IDS)? A) To prevent
unauthorized access to a network or system. B) To detect and respond to potential security threats
in real-time. C) To encrypt sensitive data during transmission. D) To authenticate users accessing the
network.
Question 2: Which of the following statements accurately describes an Intrusion Prevention System
(IPS)? A) An IPS only identifies security threats but does not take any action to prevent them. B) An
IPS actively monitors network traffic and takes automated actions to block or mitigate security
threats. C) An IPS is primarily used for encrypting data transmitted over a network. D) An IPS focuses
on authenticating users and controlling access to network resources.
Answer: B) An IPS actively monitors network traffic and takes automated actions to block or mitigate
security threats.
Question 3: What is the main difference between an IDS and an IPS? A) An IDS operates in passive
mode, while an IPS operates in active mode. B) An IDS focuses on encryption, while an IPS focuses
on authentication. C) An IDS only identifies security threats, while an IPS takes action to prevent or
mitigate them. D) An IDS is software-based, while an IPS is hardware-based.
Answer: C) An IDS only identifies security threats, while an IPS takes action to prevent or mitigate
them.
Question 4: Which of the following is a common technique used by an IDS to detect potential
security threats? A) Monitoring user authentication logs B) Analyzing network traffic for anomalies
C) Encrypting sensitive data during transmission D) Controlling access to network resources
Question 5: What action does an IPS typically take when it detects a potential security threat? A) It
sends an alert to the network administrator for manual intervention. B) It automatically blocks or
filters network traffic associated with the threat. C) It encrypts sensitive data to prevent
unauthorized access. D) It authenticates users accessing the network.
Answer: B) It automatically blocks or filters network traffic associated with the threat.
Question 6: What term refers to a technique used by an IDS to compare current network traffic
patterns against known attack signatures? A) Anomaly detection B) Signature-based detection C)
Behavior analysis D) Encryption
Question 7: Which of the following is an advantage of using an IPS over an IDS? A) An IPS consumes
fewer network resources. B) An IPS is less expensive to implement and maintain. C) An IPS can
automatically respond to security threats without human intervention. D) An IPS is more effective at
identifying potential security threats.
Answer: C) An IPS can automatically respond to security threats without human intervention.
Question 8: What term describes the process of continuously monitoring and analyzing network
traffic for signs of potential security threats? A) Encryption B) Authentication C) Intrusion detection
D) Access control
Question 9: Which of the following is a limitation of signature-based detection used by IDS and IPS?
A) It requires extensive computational resources. B) It can only detect known attack patterns. C) It is
ineffective against encrypted traffic. D) It provides real-time analysis of network traffic.
Question 10: What is the primary goal of both an IDS and an IPS? A) To monitor network
performance B) To prevent all security threats C) To detect and respond to security threats D) To
authenticate users accessing the network
Question 1: What is the primary goal of social media marketing? A) To increase website traffic B) To
boost search engine rankings C) To promote products or services through social media platforms D)
To generate email leads
Answer: C) To promote products or services through social media platforms
Question 2: Which of the following social media platforms is primarily image-based? A) Twitter B)
LinkedIn C) Instagram D) YouTube
Answer: C) Instagram
Question 3: What is the term for paid advertisements that appear on social media platforms? A)
Sponsored posts B) Organic posts C) Viral posts D) Sponsored stories
Question 4: What is the key benefit of using social media for marketing purposes? A) Limited
audience reach B) Low engagement rates C) Cost-effective targeting options D) Slow response time
Question 5: What term refers to the practice of creating and sharing content on social media
platforms to engage audiences and promote brand awareness? A) Social media advertising B) Social
media optimization C) Social media marketing D) Social media analytics
Question 6: What is a common defense tool used for social media security? A) Virtual Private
Network (VPN) B) Intrusion Detection System (IDS) C) Firewall D) Social media monitoring software
Question 7: Which of the following is a feature of social media monitoring software? A) Blocking
social media access for employees B) Identifying and analyzing social media threats and
vulnerabilities C) Encrypting social media posts D) Monitoring internet bandwidth usage
Question 8: What is the purpose of using a VPN for social media security? A) To monitor social media
activity in real-time B) To encrypt data transmitted over social media networks C) To block access to
social media platforms D) To identify potential threats on social media
Question 9: Which of the following is a benefit of using social media security tools? A) Increased
social media engagement B) Enhanced protection against cyber threats and attacks C) Reduced
visibility of social media posts D) Improved search engine rankings
Question 10: What is the primary goal of social media security tools? A) To increase social media
followers B) To prevent unauthorized access to social media accounts C) To improve social media
advertising campaigns D) To enhance social media analytics
Question 2: Which of the following social media platforms is primarily image-based? A) Twitter B)
LinkedIn C) Instagram D) YouTube
Answer: C) Instagram
Question 3: What is the term for paid advertisements that appear on social media platforms? A)
Sponsored posts B) Organic posts C) Viral posts D) Sponsored stories
Question 4: What is the key benefit of using social media for marketing purposes? A) Limited
audience reach B) Low engagement rates C) Cost-effective targeting options D) Slow response time
Question 5: What term refers to the practice of creating and sharing content on social media
platforms to engage audiences and promote brand awareness? A) Social media advertising B) Social
media optimization C) Social media marketing D) Social media analytics
Question 6: What is a common defense tool used for social media security? A) Virtual Private
Network (VPN) B) Intrusion Detection System (IDS) C) Firewall D) Social media monitoring software
Question 7: Which of the following is a feature of social media monitoring software? A) Blocking
social media access for employees B) Identifying and analyzing social media threats and
vulnerabilities C) Encrypting social media posts D) Monitoring internet bandwidth usage
Question 8: What is the purpose of using a VPN for social media security? A) To monitor social media
activity in real-time B) To encrypt data transmitted over social media networks C) To block access to
social media platforms D) To identify potential threats on social media
Question 9: Which of the following is a benefit of using social media security tools? A) Increased
social media engagement B) Enhanced protection against cyber threats and attacks C) Reduced
visibility of social media posts D) Improved search engine rankings
Question 10: What is the primary goal of social media security tools? A) To increase social media
followers B) To prevent unauthorized access to social media accounts C) To improve social media
advertising campaigns D) To enhance social media analytics
ChatGPT
ChatGPT
Certainly! Here are some multiple-choice questions (MCQs) related to Networking and Basic Security
for Windows, along with their answers:
Networking:
Question 2: What is the purpose of a router in a computer network? A) To store and manage data
files B) To connect devices within the same network C) To provide wireless access to the internet D)
To forward data packets between different networks
Question 3: What is an IP address? A) A physical address assigned to a network interface card (NIC)
B) A unique identifier for a website C) A protocol used for secure data transmission D) A type of
network cable
Question 4: Which of the following is a characteristic of a LAN (Local Area Network)? A) Covers a
large geographical area B) Connects devices within a single building or campus C) Provides internet
access to multiple users D) Connects devices across different cities or countries
Question 5: What is the purpose of a firewall in computer networking? A) To provide wireless access
to the internet B) To filter incoming and outgoing network traffic based on predefined security rules
C) To manage email communication D) To store and manage data files
Answer: B) To filter incoming and outgoing network traffic based on predefined security rules
Question 6: What is antivirus software? A) Software used to create backups of data files B) Software
used to protect against malware infections C) Software used for word processing D) Software used
to manage email communication
Question 7: Which of the following is a recommended practice for securing a Windows computer? A)
Disabling automatic updates B) Using weak passwords C) Installing security patches and updates
regularly D) Sharing passwords with colleagues
Question 10: Which of the following is a feature of Windows Firewall? A) Providing wireless access to
the internet B) Filtering incoming and outgoing network traffic C) Encrypting data files D) Managing
email communication
Top of Form
Question 2: What is the purpose of a router in a computer network? A) To store and manage data
files B) To connect devices within the same network C) To provide wireless access to the internet D)
To forward data packets between different networks
Question 3: What is an IP address? A) A physical address assigned to a network interface card (NIC)
B) A unique identifier for a website C) A protocol used for secure data transmission D) A type of
network cable
Question 4: Which of the following is a characteristic of a LAN (Local Area Network)? A) Covers a
large geographical area B) Connects devices within a single building or campus C) Provides internet
access to multiple users D) Connects devices across different cities or countries
Question 5: What is the purpose of a firewall in computer networking? A) To provide wireless access
to the internet B) To filter incoming and outgoing network traffic based on predefined security rules
C) To manage email communication D) To store and manage data files
Answer: B) To filter incoming and outgoing network traffic based on predefined security rules
Question 7: Which of the following is a recommended practice for securing a Windows computer? A)
Disabling automatic updates B) Using weak passwords C) Installing security patches and updates
regularly D) Sharing passwords with colleagues
Question 8: What is the purpose of user account control (UAC) in Windows? A) To manage network
connections B) To encrypt data files C) To restrict access to certain programs and settings D) To
monitor internet traffic
Question 10: Which of the following is a feature of Windows Firewall? A) Providing wireless access to
the internet B) Filtering incoming and outgoing network traffic C) Encrypting data files D) Managing
email communication
You
ChatGPT
ChatGPT
Certainly! Here are some multiple-choice questions (MCQs) related to Mobile Security and Wi-Fi
Security, along with their answers:
Mobile Security:
Question 1: What is mobile security? A) Protection against physical damage to mobile devices B)
Security measures to protect data stored on mobile devices and transmitted over networks C)
Ensuring high-speed internet access on mobile devices D) Enhancing battery life of mobile devices
Answer: B) Security measures to protect data stored on mobile devices and transmitted over
networks
Question 2: Which of the following is a common threat to mobile security? A) Printer vulnerabilities
B) Phishing attacks C) Router configurations D) Mainframe security
Answer: A) Encryption
Question 4: What is the purpose of a mobile device management (MDM) solution? A) To monitor
mobile device battery levels B) To remotely manage and secure mobile devices within an
organization C) To enhance mobile device performance D) To provide mobile network coverage
Question 5: What is the term for malicious software specifically designed to target mobile devices?
A) Adware B) Spyware C) Ransomware D) Mobile malware
Wi-Fi Security:
Question 6: What is Wi-Fi security? A) Securing physical access points to Wi-Fi networks B)
Protecting data transmitted over Wi-Fi networks from unauthorized access C) Increasing Wi-Fi signal
strength D) Preventing interference from other Wi-Fi networks
Answer: B) Protecting data transmitted over Wi-Fi networks from unauthorized access
Question 7: Which of the following is a common security protocol used for securing Wi-Fi networks?
A) SSL (Secure Sockets Layer) B) FTP (File Transfer Protocol) C) WPA2 (Wi-Fi Protected Access 2) D)
HTTP (Hypertext Transfer Protocol)
Question 8: What is the purpose of Wi-Fi encryption? A) To increase Wi-Fi signal strength B) To
secure data transmitted over Wi-Fi networks from eavesdropping C) To block unauthorized devices
from accessing the Wi-Fi network D) To manage Wi-Fi access points
Question 9: What is the term for a technique used to crack Wi-Fi passwords by trying every possible
combination until the correct one is found? A) Brute force attack B) Phishing attack C) Denial-of-
Service (DoS) attack D) Man-in-the-Middle (MitM) attack
Question 10: What is the purpose of changing the default SSID and password on a Wi-Fi router? A)
To increase Wi-Fi signal strength B) To enhance network performance C) To prevent unauthorized
access to the Wi-Fi network D) To improve internet speed
Question: Which of the following acts is the primary legislation governing cyber activities and
electronic transactions in India? A) Indian Penal Code, 1860 B) Banking Regulation Act, 1949 C)
Information Technology Act, 2000 D) Payment and Settlement Systems Act, 2007
Question: Which of the following statements accurately describes the difference between HTTP and
HTTPS?
A) HTTP is a protocol used for secure data transmission, while HTTPS is used for regular data
transmission. B) HTTP operates on port 443, while HTTPS operates on port 80. C) HTTPS uses
encryption to secure data transmission, while HTTP does not. D) HTTP is faster than HTTPS due to
the absence of encryption.
Answer: C) HTTPS uses encryption to secure data transmission, while HTTP does not.
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is an extension of HTTP (Hypertext Transfer
Protocol) with added security features. The key difference between the two is that HTTPS uses
encryption (usually SSL/TLS) to secure data transmission over the internet, ensuring the
confidentiality and integrity of the data. On the other hand, HTTP transmits data in plaintext, making
it vulnerable to interception and tampering.
Question 1: What is E-commerce? A) The use of mobile devices for online shopping B) The buying
and selling of goods and services over the internet C) Electronic mail communication between
businesses D) An online platform for social networking
Answer: B) The buying and selling of goods and services over the internet
Question 3: What is M-commerce? A) The use of electronic devices for mobile banking B) The use of
mobile devices for online shopping and transactions C) The sending and receiving of multimedia
messages on mobile phones D) Mobile gaming and entertainment
Answer: B) The use of mobile devices for online shopping and transactions
These questions cover the basics of E-commerce and M-commerce, including their definitions,
components, and characteristics.
Internet and Mobile Banking Security, Rules of usage of Debit and Credit Card, Guidelines of UPI
Security
Question 1: What is a common security measure used in Internet and Mobile Banking? A) Sharing
passwords with friends and family B) Using public Wi-Fi networks for transactions C) Two-factor
authentication (2FA) D) Writing down passwords on a piece of paper
Question 2: Which of the following is a best practice for ensuring security in Internet and Mobile
Banking? A) Sharing login credentials with customer support representatives B) Disabling security
features for faster transactions C) Regularly updating passwords and PINs D) Ignoring security alerts
and warnings
Question 3: What is the purpose of encryption in Internet and Mobile Banking? A) To make
transactions faster B) To protect sensitive data from unauthorized access C) To display
advertisements D) To track user behavior
Question 4: What is a common security rule for using Debit and Credit Cards? A) Sharing card details
over email or social media B) Using public computers for online transactions C) Memorizing PINs and
not writing them down D) Providing card information to unknown websites
Question 5: What should you do if your Debit or Credit Card is lost or stolen? A) Wait for it to
reappear B) Report it to the bank immediately C) Keep using it until the bank contacts you D) Share
the card details on social media for help
Question 6: What is UPI (Unified Payments Interface)? A) A social media platform B) A mobile
gaming app C) A payment system that enables instant fund transfers between bank accounts D) A
messaging app
Answer: C) A payment system that enables instant fund transfers between bank accounts
Question 7: What is a UPI PIN used for? A) Social media authentication B) Mobile gaming C) Making
secure transactions on UPI platforms D) Unlocking smartphones
Answer: C) Making secure transactions on UPI platforms
Question 8: What is a common security measure for UPI transactions? A) Sharing UPI PIN with others
B) Using unsecured Wi-Fi networks C) Verifying transaction details before authorizing D) Ignoring
transaction alerts
Question 9: What should you do if you receive unauthorized UPI transactions? A) Ignore them B)
Report them to your bank immediately C) Share your UPI PIN with others D) Post about it on social
media
Question 10: What is the purpose of setting transaction limits on UPI platforms? A) To encourage
unlimited spending B) To restrict the amount of money that can be transferred in a single
transaction C) To share personal information with others D) To increase the risk of fraud
Answer: B) To restrict the amount of money that can be transferred in a single transaction
These questions cover various aspects of Internet and Mobile Banking Security, Rules of Usage of
Debit and Credit Cards, and Guidelines of UPI, emphasizing security measures and best practices for
safe transactions.
Top of Form
Question: What does RBI stand for in the context of digital payments?
Question: What is the primary objective of RBI guidelines for digital payments?
Question: What does RBI mandate regarding customer data protection in digital payments?
Question: Which of the following is NOT a common feature of RBI guidelines for digital payments?
A) Two-factor authentication
B) Transaction limits
Question: What does RBI recommend regarding unauthorized transactions in digital payments?
Question: What does RBI recommend regarding customer grievance redressal in digital payments?
Question: What should customers do if they suspect fraudulent activity in their digital payments
account?
Question: What role does RBI play in regulating digital payment service providers?