Star Cyber Secure User
Star Cyber Secure User
1|P ag e
15.What do you mean by Identity Theft?
Ans: Fraudulent practice of using the identity of another person
16.Out of the following methods, which one backs up only the changed files and
new files created since the last incremental or full backup?
Ans: Incremental Backup
2|P ag e
30.What is Diffie-Hellman?
Ans: Asymmetric encryption algorithm
31.The feature under which each time you log in to your account, the system
sends a one-time password on your registered mobile number is known as:
Ans: Two Step Authentication
32.Which of the following is not a Malware?
Ans: Spam
33.The two most commonly used methods for securing data are:
Ans: Encryption & Authentication
34.Which of the following is not an email service provider?
Ans: Whatsapp
35.The use of methods and practices to secure the data and other information
stored on the mobile devices, such as smartphones and tablets is known as:
Ans: Mobile Device Security
36.The process that involves software based data erasure is known as:
Ans: Data Wiping
37.In the context of e-wallet, what does NFC stands for?
Ans: Near Field Communication
38.What type of network allows computers or an entire network to connect to
each other over the Internet securely?
Ans: VPN
39.How can users secure their devices from hacker attacks on iOS devices?
Ans: By enabling the passcode and Auto-Lock features
40.DDoS stands for:
Ans: A Distributed Denial of Service
41.A ________ network connects devices to the Internet or other networks using
cables.
Ans: Wired
42.Wi-Fi is a type of _______
Ans: WLAN
43.The first computer network was built in the year 1969 and it was known as:
Ans: Advanced Research Projects Agency Network (ARPANET)
44.The main function of private browsing is to:
Ans: Delete cookies, temporary Internet files and browsing history after you close
45.the browser window.
Which of the following is not an encryption method for wireless settings?
Ans: Wireless Encryption Application (WEA)
3|P ag e
46.Data destruction refers to:
Ans: The process of destroying data stored on various electronic storage media
47.Unsolicited Bulk Email (UBE) is another name for:
Ans: Spams
4|P ag e
61.______ is a device or software that allows eavesdropping on traffic moving
between computers.
Ans: Packet Sniffer
5|P ag e
75.What is a firewall?
Ans: A Software designed to block unauthorised access to a computer over a
network or the Internet
76.Which of the following is a web browser that is specially designed for kids to
show filtered results?
Ans: KidZui
77.Which of the following are not the benefits associated with computer
networks?
Ans: Distributed Software and Hardware Management
78.Data backup refers to the process of:
Ans: Copying important data to preserve it as an alternate
79.What does MITM stands for?
Ans: Man-In-The-Middle
80.Attacks that involve attempts by an intruder to monitor a communication for
stealing sensitive information that two devices transmit over a network is known
as:
Ans: Passive Threats
81.Which of the following is not a primary part of an email message?
Ans: Message Font
82.What is a built-in security feature of Windows OS that encrypts the hard drive
on your computer?
Ans: BitLocker Drive Encryption
83.What does PPTP stands for?
Ans: Point-to-Point Tunneling Protocol
84.In the context of file encryption tools, what does NTFS stands for?
Ans: New Technology File System
85.Digital signature helps in:
Ans: Authenticating the identity of the sender
86.How many types of architecture is involved in cloud implementation?
Ans: Four
87.A real-time intervention in the personal conversation of others over an
electronic medium is known as:
Ans: Eavesdropping
88.Network security is essentially required for:
Ans: All of the above
6|P ag e
89.Wide Area Network (WAN) refer to a network:
Ans: that spans over a large geographical area, such as a country or the entire
world
7|P ag e
102.___________ is a free and easy-to-use software that overwrites data on your
hard drive with random patterns.
Ans: Eraser
8|P ag e
118.Which of the following is not SaaS?
Ans: Azure
119.Electronic Mail (email) was invented by whom?
Ans: Ray Tomlinson
120.IMEI stands for:
Ans: International Mobile Equipment Identity
121.Authentication is a method for:
Ans: Verifying identity for gaining legitimate access to the system or data.
122.What is the age limit for creating an account on Instagram?
Ans: at least 13 years old
123.Why Software updates are essentially important?
Ans: They help the computer to work smoothly without any glitches
124.Which of the following can help prevent botnets?
Ans: Network Intrusion Prevention System
125.Which of the following is not a digital wallet?
Ans: Quick Heal
126.Which of the following are not the primary elements of Internet security?
Ans: Application Security
127.Which of the following is not a function of e-wallet?
Ans: Provide alternative to cloud storage
128.Extensions are software that help in:
Ans: Addition or modification of a specific feature in a browser
129.What does TLS stand for?
Ans: Transport Layer Security
130.What does SMTP stand for?
Ans: Simple Mail Transfer Protocol
131.You can recharge or fund your e-wallet from various sources such as:
Ans: All of the above
132.Out of the following, what is not a digital asset?
Ans: Name Plates
133.Which of the following is not a cloud service?
Ans: McAffe Drive
134.In which of the following parts of a user account, the user describes
himself/herself?
Ans: Profile
135.GPS stands for?
Ans: Global Positioning System
9|P ag e
136.Which of the following does not result in the loss of data?
Ans: Uninstalling Web Browser
137.What do you mean by ‘cloud’ in cloud computing?
Ans: A metaphor for the Internet
138.Another name for a zombie computer is:
Ans: Bot
139.The term ‘cybersecurity’ was coined in which year?
Ans: 1988
140.What is SPAMfighter?
Ans: Anti-Spamming Tool
141.Which of the following is also known as ‘public key encryption’?
Ans: Asymmetric Encryption
142.The security of the OS (operating system) cannot be enhanced by:
Ans: Installing multiple web browsers to access Internet
143.Businesses derive greater flexibility and enhanced data deployment options by
using________.
Ans: Hybrid Class Cloud
144.What are PDAs?
Ans: Personal Digital Assistants
145.How many types of social networking services are there?
Ans: Three
146.The Practice of sexting involves:
Ans: Sending or receiving sexually explicit material
147.A Botnet is:
Ans: A network of infected computers
148.Data is referred as a collection of:
Ans: Facts and figures
149.MobiShield is a mobile antivirus for which operating system?
Ans: iOS
150.Backdoor refers to:
Ans: A technique in which a system security mechanism is bypassed without
detection to access computer data.
10 | P a g e