This section contains more frequently asked Cyber Crime and Cyber Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What does IP mean?

  • Instance Principle
  • Internet Protocol
  • Instant Protocol
  • Intellectual Property

2. What happens to your data when it is encrypted?

  • It is transferred to a third party, encoded, then sent back.
  • It is compressed, renamed, and archived.
  • It is sent through a series of supercomputers to be compressed multiple times.
  • It is recorded to retain privacy from third-parties.

3. What is a computer virus?

  • A virus is the same as a cookie in that it is stored on your computer against your permission.
  • A virus is friendly software that is simply mislabeled.
  • Malicious software that merely stays dormant on your computer.
  • Malicious software that inserts itself into other programs.

4. Which of the following is valid difference between a Virus and a Spyware ?

  • Spyware damages data and also steals sensitive private information
  • Virus damages data, Spyware steals sensitive private information
  • Spyware damages data, Virus steals sensitive private information
  • Virus damages data and also steals sensitive private information

5. How to avoid Man-in-the-middle attacks?

  • Accept every SSL certificate, even the broken ones
  • Use connections without SSL
  • Use HTTPS connections and verify the SSL certificate
  • None of the above

6. What happens during the TCP attack; Denial of Service?

  • A virus is sent to disable their dos prompt.
  • Viruses are sent to their ISP to deny them tech support.
  • A worm is loaded onto the victim’s computer to disable their keyboard.
  • Information is repeatedly sent to the victim to consume their system resources, causing them to shut down.

7. What is Internet Protocol Security?

  • Methods to secure Internet Protocol (IP) communication.
  • Ways to disconnect your router in an emergency
  • Methods to secure a disconnected computer.
  • Methods to secure your documents from physical breaches.

8. Which of the following is a valid Cyber / Internet Security requirement?

  • Authentication
  • Integrity
  • Confidentiality
  • All of the given options are correct

9. Digital signatures provide which of the following ?

  • Authentication
  • Non-repudiation
  • Integrity protection
  • All of the given options are correct

10. In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate?

  • TCP
  • SHTTP
  • HTTPS
  • XHTTP
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook