This section contains more frequently asked Multiple Choice Questions and Answers on Cyber Security/Internet Security in the various competitive exams.
1. Which of the following is an anti-virus program
- Norton
- K7
- Quick heal
- All of these
2. All of the following are examples of real security and privacy threats except:
- Hackers
- Virus
- Spam
- Worm
Spam or SPAM may refer to:
- Spamming, unsolicited or undesired electronic messages
- Email spam, unsolicited, undesired, or illegal email messages
- Messaging spam, spam targeting users of instant messaging (IM) services, sms or private messages within websites
3. Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves
- True
- False
4. _____________ monitors user activity on internet and transmit that information in the background to someone else.
- Malware
- Spyware
- Adware
- None of these
5. Viruses are __________.
- Man made
- Naturally occur
- Machine made
- All of the above
6. Firewall is a type of ____________.
- Virus
- Security threat
- Worm
- None of the above
a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
7. Unsolicited commercial email is known as ____________.
- Spam
- Malware
- Virus
- Spyware
8. Which of the following is not an external threat to a computer or a computer network
- Ignorance
- Trojan horses
- Adware
- Crackers
9. When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
- Bullying
- Stalking
- Identity theft
- Phishing
Stalking is unwanted or repeated surveillance by an individual or group towards another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them.
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.
10. Which of the following is a class of computer threat
- Phishing
- Soliciting
- DoS attacks
- Stalking
denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.