Cyber Security

Cybersecurity involves protecting computer systems, networks, and data from unauthorized access, attacks, or damage. It includes practices like encryption, firewalls, intrusion detection, and secure authentication to safeguard sensitive information, ensuring privacy, integrity, and availability in the digital world.

1. What is the full form of LDAP?
A) Light Weight Directory Access Provider
B) Light Weight Directory Access Protocol ✅
C) Light Weight Directory Access Program
D) Light Weight Directory Access Protection

2. What is called the collective term for malicious software, such as viruses, worms, and trojans?
A) Spam
B) Phishing
C) Malware ✅
D) Harm

3. What is the full form of CIA under information security?
A) Confidentiality Integrity Availability ✅
B) Criminal Investigation Agency
C) Cost Information Agency
D) Credit Integrity Assessment

4. What is called a single point of access for several networking services?
A) Phishing
B) Web service
C) Directory service ✅
D) Worms

5. Which activities endanger the sovereignty and integrity of the nation?
A) Cyber Terrorism ✅
B) Cyber vandalism
C) Cyber squatting
D) Carding

6. Which crime involves the use of computer networks to create, distribute, or access materials that sexually exploit underage persons?
A) Assault by Threat
B) Cyber squatting
C) Cyber vandalism
D) Child pornography ✅

7. Which method goes through all the files or network elements with the intention to detect something unusual?
A) Probing
B) Phishing
C) Infecting
D) Scanning ✅

8. Victims of a cyber attack might lose ______.
A) Data
B) Money
C) Both A & B ✅
D) None of them

9. Under information security, CIA stands for ______.
A) Criminal Investigation Agency
B) Confidentiality, Integrity, Availability ✅
C) Cost Information Agency
D) Credit Integrity Assessment

10. Script files sent mostly through email attachment to attack the host computer are called ______.
A) Worms
B) Phishing attacks
C) Trojans ✅
D) Computer Viruses

11. What is called the protection of information and data from unauthorized access?
A) Physical security
B) Link security
C) Risk management
D) Information security ✅

12. Which of the following shows the need for cyber security?
a) Protection from hackers
b) Internet scams
c) Viruses
d) All of the above ✅

13. The first computer virus is_____
a) Creeper ✅
b) Rat virus
c) Worm
d) Blaster

14. Trojan horses are very similar to viruses in the programs that replicate copies of themselves.
a) True
b) False ✅

15. Maintaining computers free from cyber attacks is called ______.
a) Cyber attack
b) Risk management ✅
c) Online fraud
d) Phishing

16. When did the Indian parliament pass the IT Act?
A) 1990
B) 1992
C) 2000 ✅
D) 2005

17. What is called protecting data from online attacks, deletions, malwares?
A) Physical security
B) Cyber security ✅
C) Cyber attack
D) Virus

18. Cyber security is also called _______ security?
a) Criminal
b) Information Technology ✅
c) National
d) International

19. Which of the following is an anti-virus program?
a) Norton
b) K7
c) Quick Heal
d) All of these ✅

20. ______ monitors user activity on the internet and transmits that information in the background to someone else.
a) Malware
b) Spyware ✅
c) Adware
d) None of these

21. Passwords are used to improve the _______ of a network.
a) Performance
b) Reliability
c) Security ✅
d) Longevity

22. Where might a spammer get your personal information from?
a) Facebook
b) MySpace
c) LinkedIn
d) All of these ✅

23. What is the primary goal of encryption?
A) Data storage
B) Data confidentiality ✅
C) Data compression
D) Data integrity

24. Which type of attack involves attempting to overload a system or network with excessive traffic to make it unavailable?
A) Denial of Service (DoS) ✅
B) Man-in-the-middle
C) Phishing
D) SQL injection

25. Which protocol is used for secure communication over the internet?
A) HTTP
B) FTP
C) HTTPS ✅
D) SMTP

26. What is the process of attempting to guess a password by trying many different possibilities in quick succession called?
A) Phishing
B) Social engineering
C) Brute force attack ✅
D) Spoofing

27. What does VPN stand for?
A) Virtual Private Network ✅
B) Virtual Protected Network
C) Verified Private Network
D) Validated Protocol Network

28. Which is a type of malware that replicates itself and spreads to other computers?
A) Virus ✅
B) Spyware
C) Trojan
D) Worm

29. Which of the following is a form of social engineering attack?
A) SQL injection
B) Phishing ✅
C) Man-in-the-middle
D) Cross-site scripting (XSS)

30. What does the term “patch management” refer to?
A) Fixing physical vulnerabilities in hardware
B) Installing updates to fix security flaws ✅
C) Enhancing software features
D) Deleting outdated software

31. Which of the following is a common method of authentication used in computer security?
A) Password ✅
B) CAPTCHA
C) IP address
D) File encryption

32. Which of the following is NOT a type of malware?
A) Virus
B) Spyware ✅
C) Trojan
D) Worm

33. What is the main function of a firewall?
A) To block unauthorized access to a network ✅
B) To encrypt sensitive data
C) To monitor internet traffic
D) To authenticate users

34. What is a honeypot in cybersecurity?
A) A type of virus
B) A tool to steal information
C) A system designed to lure and trap attackers ✅
D) A tool to encrypt data

35. What is the purpose of two-factor authentication (2FA)?
A) To increase the speed of login
B) To reduce network traffic
C) To enhance security by requiring two forms of identification ✅
D) To make passwords stronger

36. Which of the following refers to the act of disguising a communication or document to deceive someone into believing it is from a trusted source?
A) Phishing
B) Spoofing ✅
C) Spamming
D) Sniffing

37. What does the term “zero-day vulnerability” refer to?
A) A new malware
B) A vulnerability that is being exploited on the same day it is discovered ✅
C) A type of encryption flaw
D) A software vulnerability that has been fixed

38. Which type of attack involves redirecting a legitimate website’s traffic to a fake one to steal information?
A) Pharming ✅
B) Phishing
C) Denial of Service (DoS)
D) SQL Injection

39. What does the term “data breach” refer to?
A) A sudden loss of power to a computer
B) Unauthorized access to confidential data ✅
C) A user forgetting their password
D) A decrease in internet speed

40. Which of the following is considered a type of spyware?
A) Trojan
B) Keylogger ✅
C) Worm
D) Virus

41. What is the primary purpose of SSL certificates?
A) To monitor network traffic
B) To secure data exchanged between a website and a browser ✅
C) To increase website loading speed
D) To provide website analytics

42. Which type of attack is characterized by intercepting and altering communication between two parties without their knowledge?
A) Man-in-the-middle attack ✅
B) Phishing
C) SQL Injection
D) Ransomware

43. Which of the following tools can be used to analyze network traffic for malicious activity?
A) Antivirus
B) Wireshark ✅
C) VPN
D) Firewall

44. Which of the following is the primary objective of ransomware attacks?
A) To steal personal information
B) To destroy data
C) To encrypt data and demand ransom for decryption ✅
D) To block network traffic

45. What does the term “social engineering” refer to in cybersecurity?
A) Attacking network infrastructure
B) Manipulating people into disclosing confidential information ✅
C) Disrupting a website’s services
D) Creating malicious software

46. Which of the following is the most secure method for storing passwords?
A) Writing them down on paper
B) Using a password manager ✅
C) Storing them in an unencrypted text file
D) Sharing them via email

47. What is the first step in responding to a cybersecurity incident?
A) Contain the threat ✅
B) Analyze the data breach
C) Report the incident to authorities
D) Remove the affected systems

48. Which of the following is a characteristic of a brute-force attack?
A) It attempts to decrypt a file
B) It tries every possible password until it finds the correct one ✅
C) It manipulates network traffic
D) It exploits a system’s software vulnerability

49. Which type of attack tries to overload a network by sending excessive traffic to make it unavailable?
A) Denial of Service (DoS) attack ✅
B) Phishing
C) Keylogging
D) SQL Injection

50. What is the term used for a network security system that monitors and controls incoming and outgoing network traffic?
A) Firewall ✅
B) Antivirus
C) VPN
D) IDS (Intrusion Detection System)