MCQ Dig

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

EXTOL COLLEGE

PUT (Pre University Test- Feb. 2024)


Subject : Physics Date: ..2024
Class : B.SC-III Year M.M.: 75
Subject Teacher : Nidhi Jain Time: 3 hrs.

Note: All sections are compulsory.

1. Question: What is the primary purpose of digital awareness?


a) To promote online shopping
b) To increase social media followers
c) To enhance knowledge and understanding of digital technologies
d) To encourage video gaming
Answer: c) To enhance knowledge and understanding of digital technologies

2. Question: What is a phishing attack?


a) A type of fishing in the digital world
b) A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy
entity
c) A computer virus that spreads through emails
d) A type of social media challenge
Answer: b) A fraudulent attempt to obtain sensitive information by pretending to be a
trustworthy entity
3. Question: Which of the following is a strong password practice?
a) Using easily guessable passwords like "123456"
b) Using a combination of letters, numbers, and symbols
c) Sharing passwords with close friends
d) Using the same password for multiple accounts
Answer: b) Using a combination of letters, numbers, and symbols
4. Question: What does the term "firewall" refer to in the context of cybersecurity?
a) A protective barrier to prevent unauthorized access to a computer or network
b) A software that enhances the speed of internet connections
c) A tool for creating digital graffiti
d) A type of antivirus program
Answer: a) A protective barrier to prevent unauthorized access to a computer or network
5. Question: What is the purpose of a Virtual Private Network (VPN)?
a) To increase the speed of internet browsing
b) To create a secure and encrypted connection over the internet
c) To block access to certain websites
d) To share personal information with others
Answer: b) To create a secure and encrypted connection over the internet
6. Question: What is two-factor authentication (2FA)?
a) Using two different computers simultaneously
b) A security feature that requires users to provide two different authentication factors to
access an account
c) A method for sharing login credentials with others
d) A type of antivirus software
Answer: b) A security feature that requires users to provide two different authentication
factors to access an account
7. Question: What is the purpose of regular software updates?
a) To slow down the computer
b) To fix bugs and vulnerabilities, improving security
c) To delete important files
d) To increase the risk of malware attacks
Answer: b) To fix bugs and vulnerabilities, improving security
8. Question: What is social engineering in the context of cybersecurity?
a) A method for building social networks
b) A way to increase social media followers
c) Manipulating people into divulging confidential information or performing actions that
compromise security
d) A new branch of computer science
Answer: c) Manipulating people into divulging confidential information or performing
actions that compromise security
9. Question: What is malware?
a) A type of hardware used for gaming
b) Malicious software designed to harm or exploit computers or networks
c) A secure file storage system
d) A computer programming language
Answer: b) Malicious software designed to harm or exploit computers or networks
10. Question: What should you do if you receive an unsolicited email with a link or attachment?
a) Click on the link or open the attachment without hesitation
b) Forward it to all your contacts
c) Delete it and do not click on any links or open attachments
d) Reply to the email and ask for more information
Answer: c) Delete it and do not click on any links or open attachments

1. Question: What does the term "phishing" refer to in the context of cybersecurity?
a) A type of fishing technique
b) A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy
entity
c) A computer virus that spreads through social media
d) A method for securing email communication
Answer: b) A fraudulent attempt to obtain sensitive information by pretending to be a
trustworthy entity
2. Question: What is the primary purpose of digital literacy?
a) Enhancing knowledge of traditional communication methods
b) Promoting online gaming
c) Understanding and effectively using digital technologies
d) Increasing print media consumption
Answer: c) Understanding and effectively using digital technologies
3. Question: How can you strengthen your passwords?
a) Use easily guessable words
b) Include personal information like your name or birthdate
c) Use a combination of uppercase and lowercase letters, numbers, and symbols
d) Share your passwords with trusted friends
Answer: c) Use a combination of uppercase and lowercase letters, numbers, and symbols
4. Question: What is the purpose of a firewall in cybersecurity?
a) Speed up internet connections
b) Prevent unauthorized access to a computer or network
c) Enhance the graphics of a computer
d) Scan for malware in emails
Answer: b) Prevent unauthorized access to a computer or network
5. Question: Which of the following is an example of two-factor authentication?
a) Using a strong password
b) Answering security questions
c) Providing a fingerprint scan and entering a code sent to your phone
d) Sharing login credentials with a colleague
Answer: c) Providing a fingerprint scan and entering a code sent to your phone
6. Question: What is the purpose of regular software updates?
a) Slow down the computer
b) Introduce new bugs and vulnerabilities
c) Enhance security by fixing bugs and vulnerabilities
d) Delete important files
Answer: c) Enhance security by fixing bugs and vulnerabilities
7. Question: What is the role of a Virtual Private Network (VPN)?
a) Increase internet speed
b) Create a secure and encrypted connection over the internet
c) Share personal information with others
d) Block access to certain websites
Answer: b) Create a secure and encrypted connection over the internet
8. Question: What is the definition of social engineering in cybersecurity?
a) Building social networks online
b) Increasing social media followers
c) Manipulating people into divulging confidential information or compromising security
d) Developing new branches of computer science
Answer: c) Manipulating people into divulging confidential information or compromising
security
9. Question: What is malware?
a) Hardware used for gaming
b) Malicious software designed to harm or exploit computers or networks
c) A secure file storage system
d) A computer programming language
Answer: b) Malicious software designed to harm or exploit computers or networks
10. Question: If you receive an unsolicited email with a suspicious link, what should you do?
a) Click on the link to investigate
b) Forward it to all your contacts
c) Delete it and do not click on any links
d) Reply and ask for more information
Answer: c) Delete it and do not click on any links
11. Question: What is the purpose of end-to-end encryption?
a) Increase internet speed
b) Secure communication by encrypting messages from sender to receiver
c) Delete messages after they are read
d) Share messages with third-party services
Answer: b) Secure communication by encrypting messages from sender to receiver
12. Question: What is the best practice for handling unknown USB drives?
a) Plug them into your computer to see what's on them
b) Avoid using them as they may contain malware
c) Share them with colleagues to see if they are useful
d) Use them for extra storage without scanning
Answer: b) Avoid using them as they may contain malware
13. Question: What is a strong indicator that an email might be a phishing attempt?
a) The email contains spelling and grammar errors
b) The email is marked as high importance
c) The email has a generic greeting like "Dear User"
d) The email contains a sense of urgency and asks for personal information
Answer: d) The email contains a sense of urgency and asks for personal information
14. Question: What is the purpose of a CAPTCHA?
a) Enhance the speed of internet browsing
b) Protect against automated bots by requiring users to prove they are human
c) Encrypt emails for secure communication
d) Increase the size of online databases
Answer: b) Protect against automated bots by requiring users to prove they are human
15. Question: What is the significance of a strong authentication process?
a) It slows down access to digital accounts
b) It ensures only one device can access an account
c) It enhances security by verifying the identity of the user
d) It requires multiple passwords for the same account
Answer: c) It enhances security by verifying the identity of the user
16. Question: What is the purpose of a security audit?
a) Increase the number of security vulnerabilities
b) Assess and improve the effectiveness of security measures
c) Share sensitive information with external parties
d) Delete unnecessary security protocols
Answer: b) Assess and improve the effectiveness of security measures
17. Question: What is the first line of defense against malware?
a) Antivirus software
b) Firewall
c) Regular software updates
d) User awareness and cautious behavior
Answer: d) User awareness and cautious behavior
18. Question: What is the role of biometric authentication?
a) Use personal information for login credentials
b) Authenticate users based on physical or behavioral characteristics
c) Share authentication codes through SMS
d) Increase the complexity of passwords
Answer: b) Authenticate users based on physical or behavioral characteristics
19. Question: How can you minimize the risk of identity theft online?
a) Share personal information on social media platforms
b) Use the same password for multiple accounts
c) Be cautious about sharing sensitive information and use strong, unique passwords
d) Respond to unsolicited emails requesting personal information
Answer: c) Be cautious about sharing sensitive information and use strong, unique
passwords
20. Question: What is the purpose of a data backup?
a) Delete unnecessary files
b) Store data on external drives for faster access
c) Ensure data can be recovered in case of loss or corruption
d) Share data with unauthorized parties
Answer: c) Ensure data can be recovered in case of loss or corruption
21. Question: What is the significance of cybersecurity training for employees?
a) Slow down work processes
b) Increase the risk of security breaches
c) Enhance employee awareness and reduce the likelihood of security incidents
d) Focus on individual productivity only
Answer: c) Enhance employee awareness and reduce the likelihood of security incidents
22. Question: How can you identify a secure website?
a) It has a long and complicated URL
b) It displays a padlock icon in the address bar and uses "https://"
c) It allows anonymous browsing
d) It requires the installation of unknown plugins
Answer: b) It displays a padlock icon in the address bar and uses "https://"
23. Question: What is the purpose of an intrusion detection system?
a) Slow down internet connections to detect intrusions
b) Prevent all incoming traffic to a network
c) Monitor and detect unauthorized access or activities in a network
d) Delete files that are considered suspicious
Answer: c) Monitor and detect unauthorized access or activities in a network
24. Question: What is the role of a security token?
a) Increase the speed of internet browsing
b) Provide an additional layer of authentication by generating one-time codes
c) Share login credentials with multiple users
d) Encrypt emails for secure communication
Answer: b) Provide an additional layer of authentication by generating one-time codes
25. Question: What is the purpose of a security policy?
a) Increase the number of security vulnerabilities
b) Establish guidelines and rules to ensure the security of an organization's information assets
c) Delete unnecessary security protocols
d) Share sensitive information with external parties
Answer: b) Establish guidelines and rules to ensure the security of an organization's
information assets
26. Question: How does ransomware typically spread?
a) Through physical media like USB drives
b) By exploiting vulnerabilities in software and systems
c) Only through email attachments
d) By sharing files on social media
Answer: b) By exploiting vulnerabilities in software and systems
27. Question: What is the purpose of a secure socket layer (SSL)?
a) Increase internet speed
b) Encrypt data exchanged between a user's browser and the website
c) Delete cookies stored in a browser
d) Allow unrestricted access to websites
Answer: b) Encrypt data exchanged between a user's browser and the website
28. Question: What is the purpose of a privacy policy on websites?
a) Increase internet speed
b) Specify how user data is collected, used, and protected
c) Delete user accounts
d) Share user data with third-party advertisers
Answer: b) Specify how user data is collected, used, and protected
29. Question: What is the role of encryption in cybersecurity?
a) Slow down internet connections
b) Protect sensitive information by converting it into a coded format
c) Increase the risk of data breaches
d) Delete important files
Answer: b) Protect sensitive information by converting it into a coded format
30. Question: How can you verify the legitimacy of a website's SSL certificate?
a) Check if the website has a long and complicated URL
b) Verify the presence of a padlock icon in the address bar and check the certificate details
c) Share personal information with the website
d) Use public Wi-Fi connections to access the website
Answer: b) Verify the presence of a padlock icon in the address bar and check the certificate
details
31. Question: What is the purpose of a security awareness program?
a) Increase the risk of security incidents
b) Slow down work processes
c) Educate individuals about potential security risks and best practices
d) Delete sensitive information from company databases
Answer: c) Educate individuals about potential security risks and best practices
32. Question: What is the significance of a strong incident response plan?
a) Increase the likelihood of security incidents
b) Slow down the resolution of security breaches
c) Minimize the impact of security incidents and facilitate a timely response
d) Delete records of security incidents
Answer: c) Minimize the impact of security incidents and facilitate a timely response
33. Question: How can you identify a phishing email?
a) It contains a generic greeting like "Dear User"
b) It has a professional appearance and format
c) It comes from a known and trusted source
d) It contains a sense of urgency and requests personal information
Answer: d) It contains a sense of urgency and requests personal information
34. Question: What is the purpose of a security patch?
a) Slow down computer performance
b) Introduce new vulnerabilities to the system
c) Fix security vulnerabilities in software and systems
d) Delete unnecessary files
Answer: c) Fix security vulnerabilities in software and systems
35. Question: How can you secure your Wi-Fi network?
a) Keep the default SSID and password provided by the router manufacturer
b) Disable encryption to allow easy access for guests
c) Use a strong, unique password for the Wi-Fi network and enable WPA or WPA2
encryption
d) Share the Wi-Fi password on social media for convenience
Answer: c) Use a strong, unique password for the Wi-Fi network and enable WPA or WPA2
encryption
36. Question: What is the purpose of a security assessment?
a) Increase the number of security vulnerabilities
b) Evaluate and identify weaknesses in an organization's security posture
c) Delete unnecessary security protocols
d) Share sensitive information with external parties
Answer: b) Evaluate and identify weaknesses in an organization's security posture
37. Question: How does a firewall contribute to network security?
a) Speed up internet connections
b) Monitor and control incoming and outgoing network traffic based on predetermined
security rules
c) Delete unnecessary files from the network
d) Share network resources with unauthorized users
Answer: b) Monitor and control incoming and outgoing network traffic based on
predetermined security rules
38. Question: What is the purpose of a security incident log?
a) Increase the likelihood of security incidents
b) Slow down the resolution of security breaches
c) Document and track security incidents for analysis and improvement
d) Delete records of security incidents
Answer: c) Document and track security incidents for analysis and improvement
39. Question: How can you recognize a potentially malicious email attachment?
a) It comes from a known and trusted source
b) It has a common file extension like .doc or .pdf
c) It contains a sense of urgency and requests personal information
d) It is unexpected, and you weren't anticipating any attachments
Answer: d) It is unexpected, and you weren't anticipating any attachments
1. Question: What is the main advantage of digital payments over traditional payment
methods?
a) Slower processing time
b) Higher transaction fees
c) Increased security and convenience
d) Limited accessibility
Answer: c) Increased security and convenience
2. Question: Which of the following is a commonly used digital payment method for
online purchases?
a) Barter
b) Cash on delivery (COD)
c) Mobile wallets
d) Postal money orders
Answer: c) Mobile wallets
3. Question: What does the term "E-commerce" stand for?
a) Electronic Communication
b) Efficient Commerce
c) Electronic Commerce
d) Easy Commerce
Answer: c) Electronic Commerce
4. Question: Which technology is commonly used for secure online transactions?
a) RFID
b) Blockchain
c) 3D Printing
d) Augmented Reality
Answer: b) Blockchain
5. Question: What is the purpose of a digital wallet in the context of digital payments?
a) Store physical cash
b) Store digital copies of ID cards
c) Store and manage digital currencies or payment information
d) Store contact information
Answer: c) Store and manage digital currencies or payment information
6. Question: Which of the following is an example of a peer-to-peer (P2P) payment
service?
a) PayPal
b) Apple Pay
c) Venmo
d) Google Pay
Answer: c) Venmo
7. Question: What is the role of encryption in securing digital payment transactions?
a) Increase processing speed
b) Decrease security measures
c) Encrypt sensitive information to protect it from unauthorized access
d) Enable cross-border transactions
Answer: c) Encrypt sensitive information to protect it from unauthorized access
8. Question: What is the purpose of a One-Time Password (OTP) in digital transactions?
a) Access a secure website
b) Complete a transaction without authentication
c) Confirm identity during a specific transaction
d) Store passwords securely
Answer: c) Confirm identity during a specific transaction
9. Question: Which of the following is a characteristic of Mobile Banking?
a) Limited accessibility
b) Only available during business hours
c) Accessible via mobile devices for various banking transactions
d) Requires physical presence at the bank
Answer: c) Accessible via mobile devices for various banking transactions
10. Question: What is the significance of the Payment Card Industry Data Security
Standard (PCI DSS)?
a) Increase transaction fees
b) Enhance customer rewards programs
c) Ensure the security of credit card transactions
d) Allow anonymous online purchases
Answer: c) Ensure the security of credit card transactions
11. Question: What does the term "Cryptocurrency" refer to?
a) Digital representation of physical currency
b) Virtual goods in online games
c) Decentralized digital currencies using cryptography for security
d) Encrypted messages between banks
Answer: c) Decentralized digital currencies using cryptography for security
12. Question: Which digital payment method is commonly associated with QR codes?
a) Contactless cards
b) Mobile wallets
c) Bitcoin
d) Electronic Funds Transfer (EFT)
Answer: b) Mobile wallets
13. Question: What is the primary advantage of contactless payments?
a) Longer transaction time
b) Higher transaction fees
c) Increased security and faster processing
d) Limited acceptance by merchants
Answer: c) Increased security and faster processing
14. Question: What is the purpose of Know Your Customer (KYC) regulations in digital
payments?
a) Increase transaction limits
b) Verify the identity of individuals to prevent fraud and illegal activities
c) Allow anonymous transactions
d) Skip authentication steps
Answer: b) Verify the identity of individuals to prevent fraud and illegal activities
15. Question: Which digital payment method is commonly associated with a physical
card?
a) Mobile wallets
b) Cryptocurrency
c) Contactless payments
d) Debit and credit cards
Answer: d) Debit and credit cards
16. Question: What is the purpose of a chargeback in the context of digital payments?
a) Increase profits for merchants
b) Protect consumers from unauthorized transactions or faulty goods/services
c) Decrease security measures
d) Enable anonymous transactions
Answer: b) Protect consumers from unauthorized transactions or faulty
goods/services
17. Question: What does the term "SSL" stand for in the context of secure online
transactions?
a) Secure Server Layer
b) Safe Socket Layer
c) Strong Security Layer
d) Secure Sockets Layer
Answer: d) Secure Sockets Layer
18. Question: Which of the following is a key feature of a secure E-commerce website?
a) Limited product variety
b) Lack of customer reviews
c) Secure and encrypted connections (https://)
d) Absence of a return policy
Answer: c) Secure and encrypted connections (https://)
19. Question: What is the role of a digital signature in digital transactions?
a) Increase transaction fees
b) Authenticate the sender and ensure the integrity of digital documents
c) Store encryption keys
d) Bypass authentication steps
Answer: b) Authenticate the sender and ensure the integrity of digital documents
20. Question: Which regulatory compliance is relevant to the protection of personal
data in digital transactions?
a) HIPAA
b) GDPR
c) FCC
d) SEC
Answer: b) GDPR (General Data Protection Regulation)
21. Question: What is the purpose of a PCI-compliant terminal in E-commerce?
a) Decrease security measures
b) Allow anonymous transactions
c) Ensure secure processing of credit card information
d) Increase transaction limits
Answer: c) Ensure secure processing of credit card information
22. Question: What is the primary advantage of having a multi-currency E-commerce
platform?
a) Simplify transaction processes
b) Increase security measures
c) Enable international transactions with various currencies
d) Decrease transaction speed
Answer: c) Enable international transactions with various currencies
1. Question: What is the primary purpose of social media platforms?
a) Online shopping
b) Social networking and communication
c) Gaming
d) Digital currency exchange
Answer: b) Social networking and communication
2. Question: Which of the following is an example of a professional
networking platform?
a) Facebook
b) Instagram
c) LinkedIn
d) Snapchat
Answer: c) LinkedIn
3. Question: What does the term "viral" mean in the context of social media?
a) A computer virus spread through social media
b) Content that spreads rapidly and widely across the internet
c) A popular type of social media filter
d) A type of social media challenge
Answer: b) Content that spreads rapidly and widely across the internet
4. Question: What is the purpose of a hashtag (#) on social media platforms?
a) Indicate the end of a post
b) Categorize and link posts to specific topics or keywords
c) Block unwanted followers
d) Encrypt messages for privacy
Answer: b) Categorize and link posts to specific topics or keywords
5. Question: What is the significance of the "like" button on social media?
a) Request to connect with other users
b) Express approval or appreciation for a post
c) Share a post with a wider audience
d) Mark a post as inappropriate
Answer: b) Express approval or appreciation for a post
6. Question: Which of the following is a potential risk of sharing personal
information on social media?
a) Improved online privacy
b) Enhanced security
c) Identity theft and privacy invasion
d) Faster internet connection
Answer: c) Identity theft and privacy invasion
7. Question: What is the purpose of privacy settings on social media
platforms?
a) Increase the visibility of posts to the public
b) Restrict access to posts and personal information based on user
preferences
c) Prevent the creation of social media accounts
d) Enhance the speed of social media interactions
Answer: b) Restrict access to posts and personal information based on user
preferences
8. Question: Which social media platform is known for its character limit on
posts?
a) Facebook
b) Instagram
c) Twitter
d) Snapchat
Answer: c) Twitter
9. Question: What is the purpose of a "DM" on social media?
a) Display Message
b) Direct Message
c) Digital Marketing
d) Data Management
Answer: b) Direct Message
10.Question: What is the primary goal of social media marketing?
a) Increase personal connections
b) Share personal achievements
c) Promote products or services to a target audience
d) Enhance personal hobbies and interests
Answer: c) Promote products or services to a target audience
11.Question: What is a potential consequence of engaging in cyberbullying
on social media?
a) Increased popularity and followers
b) Legal consequences and social backlash
c) Enhanced online security
d) Improved mental health
Answer: b) Legal consequences and social backlash
12.Question: Which of the following is a common method for securing social
media accounts?
a) Sharing passwords with friends
b) Using easily guessable passwords
c) Enabling two-factor authentication
d) Avoiding password changes
Answer: c) Enabling two-factor authentication
13.Question: What is the purpose of a social media algorithm?
a) Increase internet speed for social media platforms
b) Organize and prioritize content for users based on their preferences and
behavior
c) Block access to certain social media features
d) Enhance the visual appearance of social media profiles
Answer: b) Organize and prioritize content for users based on their
preferences and behavior
14.Question: What is "phishing" in the context of social media security?
a) A type of fishing technique
b) A fraudulent attempt to obtain sensitive information by pretending to be
a trustworthy entity
c) A popular social media challenge
d) A new feature to increase social media engagement
Answer: b) A fraudulent attempt to obtain sensitive information by
pretending to be a trustworthy entity
15.Question: How can users enhance their social media security?
a) Share passwords with friends for backup
b) Use the same password across multiple platforms
c) Regularly update passwords, enable two-factor authentication, and be
cautious of phishing attempts
d) Post personal information publicly for better connections
Answer: c) Regularly update passwords, enable two-factor authentication,
and be cautious of phishing attempts
16.Question: What is the purpose of a social media content policy?
a) Increase the number of posts
b) Ensure fair competition among users
c) Define acceptable behavior and guidelines for content shared on the
platform
d) Encourage the sharing of controversial content
Answer: c) Define acceptable behavior and guidelines for content shared
on the platform
17.Question: What is the role of social media influencers?
a) Enhance online privacy
b) Promote products or services to their followers
c) Increase internet speed for their followers
d) Block access to their social media profiles
Answer: b) Promote products or services to their followers
18.Question: How can users identify fake profiles or accounts on social media?
a) Accept friend requests from unknown users
b) Verify account details and check for suspicious activity or inconsistencies
c) Share personal information with all followers
d) Avoid using privacy settings
Answer: b) Verify account details and check for suspicious activity or
inconsistencies
19.Question: What is the significance of a social media analytics tool?
a) Increase the number of social media followers
b) Monitor and analyze the performance of social media content and
campaigns
c) Block access to certain social media features
d) Enhance the visual appearance of social media profiles
Answer: b) Monitor and analyze the performance of social media content
and campaigns
20.Question: What does the term "Troll" refer to on social media?
a) A type of social media filter
b) A person who creates and shares engaging content
c) Someone who intentionally provokes or harasses others online
d) A popular social media challenge
Answer: c) Someone who intentionally provokes or harasses others online
21.Question: How can users minimize the risk of oversharing on social media?
a) Share personal information freely to build stronger connections
b) Regularly update their location status
c) Be mindful of the information shared, avoid sharing sensitive details, and
review privacy settings
d) Increase the frequency of posts
Answer: c) Be mindful of the information shared, avoid sharing sensitive
details

You might also like