Vous êtes sur la page 1sur 4

7/7/2020 Cyber Security MCQ Set 1 » ExamRadar

HOME CYBER SECURITY CS CORE SUBJECTS  PROGRAMMING 

QUE AND ANS MCQ SETS ONLINE TEST BOOKS

Cyber Security MCQ Set 1 A+ A A-

This section contains more frequently asked Multiple Choice


Questions and Answers on Cyber Security/Internet Security in
the various competitive exams.
Practice it now
1 . Which of the following is an anti-virus program
A. Norton
B. K7
C. Quick heal
D. All of these

Correct Answer :
All of these
View Answer

2 . All of the following are examples of real security and


privacy threats except:
A. Hackers
B. Virus
C. Spam
D. Worm

Correct Answer :
Spam
Explanation : Spam or SPAM may refer to:

examradar.com/cyber-security-mcq-set-1/ 1/5
7/7/2020 Cyber Security MCQ Set 1 » ExamRadar

Spamming, unsolicited or undesired electronic


messages
Email spam, unsolicited, undesired, or illegal email
messages
Messaging spam, spam targeting users of instant
messaging (IM) services, sms or private messages
within websites

View Answer

3 . Trojan horses are very similar to virus in the matter that


they are computer programs that replicate copies of themselves
A. True
B. False

Correct Answer :
False
View Answer

4 . _____________ monitors user activity on internet and


transmit that information in the background to someone else.
A. Malware
B. Spyware
C. Adware
D. None of these

Correct Answer :
Spyware
View Answer

5 . Viruses are __________.


A. Man made
TABLE OF CONTENTS B. Naturally occur
 Cyber Security MCQ Set C. Machine made
1 D. All of the above
 Cyber Security MCQ Set-
2 Correct Answer :
examradar.com/cyber-security-mcq-set-1/ 2/5
7/7/2020 Cyber Security MCQ Set 1 » ExamRadar

 Cyber Security MCQ Set- Man made


3 View Answer

 Cyber Security MCQ Set- 6 . Firewall is a type of ____________.


4
A. Virus
 Cyber Security MCQs
B. Security threat
Set-5
C. Worm
 Cyber Security MCQs
Set-6 D. None of the above
View Answer
 Cyber Security MCQs
Set-7 7 . Unsolicited commercial email is known as ____________.
 Cyber Security MCQs A. Spam
Set-8 B. Malware
 Cyber Security MCQs C. Virus
Set-9
D. Spyware
 Cyber Security MCQ
SET- 10 Correct Answer :
 Cyber Security MCQ Spam
SET- 11
View Answer

 Cyber Security MCQ


8 . Which of the following is not an external threat to a
SET- 12
computer or a computer network
A. Ignorance
 Cyber Security MCQ B. Trojan horses
SET- 13
C. Adware
 Cyber Security MCQ
D. Crackers
SET- 14
 Cyber Security MCQ Correct Answer :
SET- 15
Ignorance
 Cyber Security MCQ
View Answer
SET- 16
9 . When a person is harrassed repeatedly by being followed,
 Cyber Security MCQ
SET- 17 called or be written to he / she is a target of

 Cyber Security MCQ


A. Bullying
SET- 18 B. Stalking
 Cyber Security MCQ C. Identity theft
SET- 19 D. Phishing
 Cyber Security MCQ
examradar.com/cyber-security-mcq-set-1/ 3/5
7/7/2020 Cyber Security MCQ Set 1 » ExamRadar
Cybe Secu ty MCQ
SET- 20 Correct Answer :
 Cyber Security MCQ Stalking
SET- 21
Explanation : Stalking is unwanted or repeated
 Cyber Security MCQ surveillance by an individual or group towards another
SET- 22
person. Stalking behaviors are interrelated
 Cyber Security MCQ
to harassment and intimidation and may include following
SET- 23
the victim in person or monitoring them.
 Cyber Security MCQ
SET- 24 Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual, group, or
 Cyber Security MCQ
SET- 25 organization.It may also include monitoring, identity

 Cyber Security MCQ


theft, threats, vandalism, solicitation for sex, or gathering
SET- 26 information that may be used to threaten, embarrass or
 Cyber Security MCQ harass.
SET- 27
View Answer

 Cyber Security MCQ


10 . Which of the following is a class of computer threat
SET- 28
A. Phishing
 Cyber Security MCQ
SET- 29 B. Soliciting
C. DoS attacks
 Cyber Security MCQ
SET- 30 D. Stalking

SPONSORED SEARCHES Correct Answer :


DoS attacks
cyber security mcq with answers
Explanation : denial-of-service attack (DoS attack) is
cyber security multiple choice questions
a cyber-attack in which the perpetrator seeks to make a
mcq on computer security machine or network resource unavailable to its
intended users by temporarily or indefinitely
mcq on cyber safety
disrupting services of a host connected to the Internet.
practice exam test questions View Answer

Next 
Cyber Security MCQ Set-2

If you have any Questions regarding this free Computer Science tutorials ,Short Questions and Answers,Multiple choice
Questions And Answers-MCQ sets,Online Test/Quiz,Short Study Notes don’t hesitate to contact us via Facebook,or

examradar.com/cyber-security-mcq-set-1/ 4/5

Vous aimerez peut-être aussi