MCQ Question Bank-IS-1
MCQ Question Bank-IS-1
1. _______ is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
2. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
--------------
26. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
30. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
32 . ____________ is the term used for gathering information about your competitors from online
resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
33. In the world of data, where data is considered the oil and fuel of modern technology
_____________ is both a product and a process.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
34. Which of them is not a proper step in competitive intelligence data processing?
a) Data gathering
b) Data analysis
c) Information security
d) Network analysis
35. ______________ is important to grab a quick understanding and analyzing about your
competitors or target user’s need.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
36. Predict and analyze the tactics of competitors from data taken out from online data sources is a
crime.
a) True
b) False
39. ____________ is the term used for gathering information about your competitors from online
resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
40. Which two of the following are authentication algorithms?
a) MAC
b) AES
c) DAS
d) Digital-signature
ANSWERS
1. C 32. A
2. B 33. A
3. B 34. D
4. C 35. A
5. D 36. B
6. B 37. A
7. C 38. B
8. D 39. A
9. C 40. A
10. A
11. D
12. D
13. A
14. D
15. C
16. D
17. C
18. A
19. C
20. D
21. B
22. C
23. A
24. A
25. A
26. B
27. B
28. A
29. C
30. A
31. D