Cyber Security MCQ's With Answers

19 Questions of Cyber Security which you will see in tomorrow exam


1. The first computer virus is

Sasser

Creeper

Blaster

I Love You

2.All of the following are examples of real security and privacy risks EXCEPT?

Spam

Cracker/Hacker

Identity Theft

Viruses

3.What is “Trend Micro”?

It is a virus program

It is an anti-virus program

It is just a financial program

None of the above

4.Phishing is:

An on-line sport similar to bass fishing, except you do not get a sunburn.

A social engineering method involving sending a link to a bogus website in e-mail.

Sending an e-mail to a friend or business associate with a return request on it.

A sensor used to monitor your on-line activities.

5. VIRUS stands for:

Very Intelligent until Source

Vital Information Resource Under Siege

Viral Important Record User Searched

Very Interchanged Resource Under Search

6. The type(s) of auto executing macros, in Microsoft word is/are

Command macro

Auto macro

Auto execute

All of the above

7. _____ are used in denial of service attacks, typically against targeted websites.

Trojan horse

Zombie/BOTs

Worm

Virus

8.A _____ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks

Trap doors

Zombie

Virus

Worm

9. A virus that migrates freely within a large population of unauthorized email user is called a

Macro

Flame War

Worm

Blaster

10. Delayed payload of some viruses is also called as

Bomb

Time

Anti-virus

None of the above

11. When browsing online, a new window pops up stating that a virus has been found on your computer. The window provides a button to click offering to resolve the issue. Your best course of action is to:

Click on the button to remove the virus.

Place your cursor over the button and check the link’s website address (URL). If the address looks legitimate, click on it. If it looks like a scam link, close the window.

Close both the original browser window and the new “pop-up” window. Do not return to that site.  .

Hit the back

12. To “authenticate” telephone callers designated as Bank employee, I should ask “out of pocket questions.” The best example of this is:

Amount of last deposit

Phone Number

Address

Account Number

13. Music and picture files (jpg,bmp,avi,mp3,mp4,etc) that do not contain a hidden extension can still execute malicious code on the computer?

TRUE

FAISE

14. How often will your bank request a confirmation of your password or account number via email?

Once a month

Never

Once a year

Once every six months


15.  You just received an email from a very wealthy person that needs your help moving money across an international border. For just a few dollars you can help him and he is offering to pay you many times more than your out of pocket expenses. What do u do?

Take him up on his offer. Easy money!!!

Delete the email. If this happens at work, report the attempt to the IT security office.

Forward the message to your friends so they can have a chance to make money as well.

Reply with a note that you know it’s a scam and are smart enough to recognize the

attempt


16.  Spam is the Internet version of junk e-mail. You should:

Use the “opt-out” feature, if one is available.

Forward it to other employees, as they may be interested in the product/service being offered.

Reply to the sender, requesting they remove you from future mailings.

Delete it from your mailbox.


17.  Which of these passwords is the most secure?

password

Password1!

P@$$w0rd1!

grouchy_cat

18.  Code red is a(n)

Word Processing Software

Photo Editing Software

Antivirus

Virus

19. What is the first boot sector virus?

Mind

Brain

ELK cloner

None of the Above

Post a Comment

0 Comments