0% found this document useful (0 votes)
35 views11 pages

Cyber Olympoid

Uploaded by

nishisultania.sy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views11 pages

Cyber Olympoid

Uploaded by

nishisultania.sy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

MULTIPLE CHOICE QUESTIONS UNIT 1: INTRODUCTION TO CYBER

SECURITY

1) "IoT" stand for in the context of cybersecurity ……..


[a] Internet of Things [b] Input-Output Technology [c]
Information Overload Toolkit [d] International Online Tracking
2. VPN (Virtual Private Network) primarily provide ………….
[a] Firewall protection [b] Anonymity on the internet
[c] Enhanced download speed [d] Video streaming services
3. The primary purpose of a firewall in cybersecurity ………
[a] Protecting against physical break-ins [b]Monitoring web traffic
[c] Encrypting data transmissions [d] Filtering and controlling network traffic
4. The term for the practice of sending fraudulent emails to deceive individuals into
revealing personal information ……….
[a] Malware [b] Hacking
[c] Social engineering [d] Encryption
5. What is cyberspace? ………..
[a] A physical location
[b] A virtual environment created by interconnected computers
[c] An alternate reality [d] A fictional concept
6. The primary purpose of a VPN (Virtual Private Network) ……..
[a] To play online games [b] To secure and anonymize internet connections
[c] To access outer space [d] To send physical mail
7. The term for the deliberate spreading of false information online to deceive and
manipulate people ……..
[a] Cyberwarfare [b] Cyberbullying
[c] Disinformation [d] Cyber espionage
8. The "URL" stand for in the context of web addresses ………
[a] Uniform Resource Locator [b] Universal Resource Language
[c] Unidentified Real-time Link [d] Universal Remote Location
9. The common cybersecurity threat in cyberspace ……..
[a] Solar flares [b] Hurricanes
[c] Malware [d] Earthquakes
10. The "ISP" stand for in the context of internet services ………..
[a] Internet Security Protocol [b] Internet Speed Provider
[c] Internet Service Provider [d] Internet Search Platform
11. The protocol is commonly used for sending emails in cyberspace ………
[a] HTTP (Hypertext Transfer Protocol) [b] SMTP (Simple Mail Transfer Protocol)
[c] VPN (Virtual Private Network) [d] FTP (File Transfer Protocol)
12. The primary goal of cybersecurity in cyberspace ……….
[a] To facilitate online shopping
[b] To eliminate all online risks
[c] To protect digital information and systems from threats
[d] To increase social media engagement
13. HTML stand for in web technology ………….
[a] Hyperlink Text Markup Language [b] Hypertext Transfer Protocol
[c] Hypertext Markup Language [d] High-Tech Multimedia Language
14. The programming language is primarily used for client-side scripting in web
Development ……..
[a] Python [b] Java
[c] JavaScript [d] PHP
15. The role of a web server in the context of web technology ………
[a] Rendering web pages in browsers [b] Storing user data on the internet
[c] Hosting and serving web content to clients [d] Protecting against viruses and malware
16. The technology allows for real-time, bidirectional communication between a web
server and a client browser ………
[a] HTML [b] CSS
[c] AJAX (Asynchronous JavaScript and XML) [d] WebSockets
17. The primary function of a web browser ………..
[a] To create websites [b] To host websites
[c] To access and display web content [d] To manage database systems
18. The protocol is commonly used for secure data transmission over the internet
………
[a] HTTP [b] HTTPS
[c] FTP [d] SMTP
19. The main purpose of an IP address in internet communication ……..
[a] To specify a website's designed m
[b] To identify the physical location of a server
[c] To uniquely identify devices on a network
[d] To encrypt data transmissions
20. The internet protocol is used for sending and receiving emails ………
[a] HTTP [b] FTP
[c] SMTP [d] DNS
21. The term for the practice of obtaining sensitive information, such as passwords or
credit card numbers, by disguising as a trustworthy entity in an electronic
communication ……….
[a] Hacking [b] Encryption
[c] Phishing [d] Spamming
22. The internet browser is developed by the Mozilla Foundation ……..
[a] Chrome [b] Safari
[c] Firefox [d] Edge
23. The technology is commonly used to create and format web documents ………..
[a] TCP/IP [b] HTML (Hypertext Markup Language)
[c] VPN (Virtual Private Network) [d] JavaScript
24. The primary purpose of a web browser ………
[a] To host websites [b] To send emails
[c] To access and display web content [d] To manage computer files
25. The term for a clickable link on a web page that takes to another web page or
resource
…………
[a] Web marker [b] Hyperlink
[c] Web token [d] Internet shortcut
26. When was the first successful message sent over ARPANET, the precursor to the
modern internet ……….
[a] 1960 [b] 1969 [c] 1975 [d] 1985
27. The technology was used to create the first web browser, called "World Wide Web
……..
[a] Mosaic [b] Netscape Navigator
[c] Lynx [d]HTML (Hypertext Markup Language)
28. The term for the practice of connecting different computer networks to form the
internet
[a] Internetworking [b] Intranetworking
[c] Interconnecting [d] Intriguing
29. The primary purpose of the original ARPANET, the precursor to the internet …….
[a] To support military communication during wartime
[b] To provide free public internet access
[c] To enable global e-commerce
[d] To serve as a platform for social networking
30. The organization is responsible for managing the allocation of IP addresses and
domain names on the Internet ………
[a] ICANN [b] UNESCO
[c] WHO [d] NSA

UNIT 2: CYBER CRIME AND CYBER LAW

1. What is cybercrime? …………


[a] A form of virtual reality gaming
[b] Illegal activities conducted over the internet
[c] A type of computer hardware
[d] Online etiquette guidelines
2. Which of the following is an example of a cybercrime? ………
[a] Playing online video games [b] Sending emails to friends
[c] Hacking into someone's bank account [d] Posting photos on social media
3. The term for a cybercrime in which criminals use deceptive emails or websites to
trick individuals into revealing personal information …………..
[a] Phishing [b] Spamming
[c] Hacking [d] Viral marketing
4. The cybercrime involves illegally copying and distributing copyrighted digital
material, such as music or movies …………
[a] Hacking [b] Phishing
[c] Cyberbullying [d] Digital piracy
5. What is a "botnet" in the context of cybercrime? ……….
[a] A type of computer virus
[b] A network of infected computers controlled by a remote attacker
[c] A secure online shopping website
[d] A social media platform
6. Which of the following is a form of cybercrime that involves harassing, threatening,
or targeting individuals online? ………
[a] Hacking [b] Digital piracy
[c] Cyberbullying [d] Phishing
7. The primary motive behind cyber extortion, a common form of cybercrime ………..
[a] Gaining notoriety [b] Seeking revenge
[c] Financial gain [d] Political activism
8. The term for a cybercrime that involves spreading false information about someone
with the intent to harm their reputation ……..
[a] Cyberstalking [b] Cyberbullying
[c] Cyberdefamation [d] Cyber hacking
9. The cyber law primarily deal with ……….
[a] Laws related to outer space
[b] Legal issues involving computer networks and the internet
[c] Environmental regulations
[d] Criminal law
10. The primary goal of cyber law ……….
[a] To prevent all forms of online communication
[b] To regulate social media usage
[c] To establish legal guidelines for internet-related activities
[d] To promote online anonymity
11. The area of cyber law deals with intellectual property rights, copyright
infringement, and digital piracy ………
[a] Cybersecurity law [b] Information technology law
[c] Cybercrime law [d] Intellectual property law
12. Type of cybercrime involves unauthorized access to computer systems or networks
with the intent to steal, alter, or destroy data ………..
[a] Cyberbullying [b] Hacking
[c] Online fraud [d] Phishing
13. The primary objective of cybercrimes categorized as "financial cybercrimes"
………
[a] Spreading malware [b] Gaining unauthorized access to systems
[c] Financial gain or theft [d] Cyberbullying
14. The term for cybercrimes that involve spreading false or misleading information
with the intent to damage a person's reputation or credibility ………
[a] Online fraud [b] Cyberbullying
[c] Defamation [d] Hacking
15. The Type of cybercrime involves distributing malicious software that can damage or
compromise computer systems or data …….
[a] Hacking [b] Phishing
[c] Malware distribution [d] Identity theft
16. The term for cybercrimes that target critical infrastructure systems, such as power
grids, water supplies, or transportation networks? ………..
[a] Cyberbullying [b] Cyberterrorism
[c] Online fraud [d] Phishing
17. What is financial fraud? ……….
[a] Legal financial transactions
[b] Unintentional financial errors
[c] Intentional deceptive practices for financial gain
[d] Financial assistance for those in need
18. Which type of financial fraud involves creating fake financial documents or records
to deceive others for financial gain? ………..
[a] Identity theft [b] Money laundering
[c] Forgery [d] Tax evasion
19. Which type of financial fraud involves intentionally providing false or misleading
information on tax returns to reduce tax liability? …………
[a] Tax evasion [b] Tax compliance
[c] Tax transparency [d] Tax credits
20. What is "malware"?
[a] A type of computer hardware
[b] A form of online shopping
[c] Malicious software designed to harm or infiltrate computer systems
[d] A computer programming language
21. Which type of malware disguises itself as legitimate software but contains malicious
code that can harm your computer or steal your data? …………
[a] Virus [b] Worm
[c] Trojan Horse [d] Spyware
22. What is "ransomware"? ……….
[a] Malware that records your keystrokes
[b] A type of online shopping platform
[c] Malware that encrypts your files and demands a ransom for their release
[d] A type of antivirus software
23. The remedial measures in cybersecurity primarily focused on ……….
[a] Preventing future cyberattacks
[b] Detecting ongoing cyberattacks
[c] Responding to and recovering from cyberattacks
[d] Promoting ethical hacking
24. The primary purpose of the Information Technology Act of 2000 in India
[a] To regulate the sale of electronic devices
[b] To promote the use of traditional paper-based documents
[c] To provide legal recognition to electronic transactions and digital signatures
[d] To ban the use of computers for financial transactions
25. Which amendment to the Information Technology Act in 2008 introduced provisions
related to data protection and privacy in India? ……. [a] Amendment Act of 2005
[b] Amendment Act of 2006
[c] Amendment Act of 2008 [d] Amendment Act of 2010
26. Which amendment to the IT Act introduced provisions related to the punishment for
cyberterrorism and cyberattacks on critical infrastructure a ……….
[a] Amendment Act of 2005 [b]Amendment Act of 2006
[c]Amendment Act of 2008 [d]Amendment Act of 2010

27. The purpose of the IT (Amendment) Act of 2008's provision related to the
blocking of websites …….
[a]To promote free access to all websites
[b]To restrict access to specific websites for security reasons
[c]To ban all online content
[d]To limit access to government websites only
28. Which government agency is responsible for enforcing the provisions of the IT Act
2000 and its amendments in India? ………
[a]Ministry of Finance
[b]Ministry of Health and Family Welfare
[c]Ministry of Electronics and Information Technology
[d]Ministry of Education
29. The legal framework that governs the use of electronic signatures and records in
India.
[a] Electronic Transactions Act [b]Electronic Records Act
[c]Information Technology Act [d] Cybersecurity and Privacy Act
30. The legal concept allows individuals to remain silent and avoid self-incrimination
when questioned by law enforcement in cybercrime cases ………
[a] Search and seizure [b]Habeas corpus
[c]Right to privacy [d]Right to remain silent

UNIT 3: SOCIAL MEDIA OVERVIEW AND SECURITY

1. The primary purpose of social media …….


[a] Entertainment [b] Communication
[c] Online shopping [d] Weather updates
2. Which social media platform is known for its character limit per tweet? ……..
[a] Facebook [b] Instagram
[c] Twitter [d] LinkedIn
3. The social media platform is primarily focused on professional networking and job
searching ………
[a] Facebook [b] Instagram
[c] Twitter [d] LinkedIn
4. The term for content that spreads rapidly and widely on social media ………
[a] Popular content [b] Trending content
[c] Viral content [d] Engaging content
5. What is a "hashtag" used for in social media? ………
[a] To separate paragraphs [b] To mark the beginning of a post
[c] To categorize and link content [d] To hide content from certain users
6. The primary purpose of the "report" or "flag" feature on social media platforms
……..
[a] To send direct messages [b] To make posts private
[c] To report inappropriate content [d] To start a video call
7. The security measure helps protect social media accounts from unauthorized access
…….
[a] Using weak passwords
[b] Enabling two-factor authentication (2FA)
[c] Sharing login credentials with friends
[d] Logging in from public computers
8. The potential consequence of oversharing personal information on social media ……
[a] Increased privacy [b] Enhanced security
[c] Identity theft [d] Better online relationships
9. The primary purpose of social networks ……..
[a] Online shopping [b] Business promotion
[c] Global connectivity and communication [d] Entertainment
10. The social network is known for its emphasis on professional networking and job
searching ………..
[a] Facebook [b] Instagram [c] Twitter [d] LinkedIn
11. The following is not a popular social networking platform …….
[a] Snapchat [b] Pinterest
[c] YouTube [d] eBay
12. The term for online communities built around shared interests or hobbies on social
networks ………
[a] Online clubs [b] Virtual societies
[c] Social groups [d] Online communities
13. The social network is primarily focused on short video content and trends ……….
[a] Facebook [b] Instagram
[c] TikTok [d] LinkedIn
14. The type of social media platform primarily focuses on sharing short, 140-character
messages called "tweets" …………
[a] Social networking sites [b] Microblogging platforms
[c] Multimedia sharing platforms [d] Professional networking sites
15. The type of social media platform is known for its emphasis on visual content, such
as photos and videos ………..
[a] Social networking sites [b] Microblogging platforms
[c] Multimedia sharing platforms [d] Social bookmarking sites
16. The type of social media platform is designed for professionals to connect
with colleagues, build their network, and seek job opportunities ……… [a]
Social networking sites [b] Microblogging platforms
[c] Multimedia sharing platforms [d] Professional networking sites
17. The type of social media platform focuses on enabling users to discover and share
web content with others through bookmarks or links ……..
[a] Social networking sites [b] Microblogging platforms
[c] Multimedia sharing platforms [d] Social bookmarking sites
18. The type of social media platform is primarily used for connecting with friends,
family, and acquaintances, and sharing personal updates ……..
[a] Social networking sites [b] Microblogging platforms [c]
Multimedia sharing platforms [d] Professional networking sites
19. The main purpose of Pinterest as a social media platform ……….
[a] Sharing short text updates [b] Posting photos and videos
[c] Discovering and sharing visual inspiration [d] Professional networking
20. The primary purpose of LinkedIn as a social media platform ……..
[a] Sharing personal updates and photos
[b] Discovering and sharing recipes
[c] Networking with professionals and seeking job opportunities
[d] Posting short video content
21. The primary function of YouTube as a social media platform …………
[a] Sharing short text updates [b] Posting photos and videos
[c] Networking with professionals [d] Live streaming music
concerts
22. The primary purpose of social media monitoring ……..
[a] Creating engaging content [b] Managing advertising campaigns
[c] Tracking and analysing online conversations [d] Building a large follower base
23. The term describes the process of monitoring social media channels for mentions of
a brand, product, or keyword ……….
[a] Social listening [b] Social engagement
[c] Social posting [d] Social networking
23. Social media metric measures the number of times a post is shared by users ……….
[a] Impressions [b] Click-through rate (CTR)
[c] Engagement rate [d] Virality
24. The tool or software is commonly used for social media monitoring and analytics
…….
[a] Microsoft Word [b] Photoshop
[c] Google Analytics [d] Hootsuite
25. The hashtag primarily used for on social media platforms ……..
[a] Sharing private messages [b] Categorizing and grouping content
[c] Sending direct messages [d] Editing photos
26. The symbol is commonly used to represent a hashtag ………
[a] @ [c] $ [b] # [d] %
27. The term for a hashtag that is trending and widely used by a large number of users
at a specific time ……..
[a] Evergreen hashtag [b] Viral hashtag
[c] Trending hashtag [d] Niche hashtag
28. The character limit for a hashtag on Twitter ……….
[a] 10 characters [b] 25 characters
[c] 140 characters [d] 280 characters
29. The term for content that becomes popular through online sharing and is often
characterised by its rapid spread …….
[a] Trending content [b] Shareable content
[c] Viral content [d] Sponsored content
30. The term for the practice of creating and publishing content on social media
platforms with the aim of engaging and retaining a specific target audience ………
[a] Social media advertising [b] social media monitoring
[c] Social media management [d] Social media listening

You might also like