We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Unit IV: Web Surfing and Cyber security. 7.
Which of the following is an objective of
5th Semester Co-curricular course network security? a) Confidentiality (MCQs with answers) b) Integrity c) Availability d) All of the above 1. What is Cyber Security? Answer: d a) Cyber Security provides security against 8. Which of the following is not a cybercrime? malware a) Denial of Service b) Cyber Security provides security against b) Man in the Middle cyber-terrorists c) Malware c) Cyber Security protects a system from d) AES (Advanced Encryption Standard) cyber attacks Answer: d d) All of the mentioned 9. Which of the following is a component of Answer: d cyber security? 2. What does cyber security protect? a) Internet Of Things a) Cyber security protects criminals b) AI b) Cyber security protects internet-connected c) Database systems d) Attacks c) Cyber security protects hackers Answer: a d) None of the mentioned 10. Which of the following is a type of cyber Answer: b attack? 3. Who is the father of computer security? a) Phishing a) August Kerckhoffs b) SQL Injections b) Bob Thomas c) Password Attack c) Robert d) All of the above d) Charles Answer: d Answer: a 11. Which of the following is not an advantage of 4. Which of the following is defined as an cyber security? attempt to steal, spy, damage or destroy a) Makes the system slower computer systems, networks, or their b) Minimizes computer freezing and crashes associated information? c) Gives privacy to users a) Cyber attack d) Protects system against viruses b) Computer security Answer: a c) Cryptography 12. “Cyberspace” was coined by _________ d) Digital hacking a) Richard Stallman Answer: a b) William Gibson 5. Which of the following is a type of cyber c) Andrew Tannenbaum security? d) Scott Fahlman a) Cloud Security Answer: b b) Network Security 13. In which year has hacking become a practical c) Application Security crime and a matter of concern in the field of d) All of the above cyber technology? Answer: d a) 1991 6. What are the features of cyber security? b) 1983 a) Compliance c) 1970 b) Defense against internal threats d) 1964 c) Threat Prevention Answer: c d) All of the above Answer: d 14. Governments hired some highly skilled 20. Which of the following is defined as an hackers for providing cyber security for the attempt to harm, damage or cause threat to a country or state. These types of hackers are system or network? termed as _______ a) Digital crime a) Nation / State sponsored hackers b) Threats b) CIA triad c) System hijacking c) Special Hackers d) Cyber Attack d) Government Hackers Answer: d Answer: a 21. Computers on the internet communicate with 15. Which of the following act violates cyber each other using the ___________ protocol. security? a) HTTP a) Exploit b) SMTP b) Attack c) FTP c) Threat d) TCP/IP d) Vulnerability Answer: a Answer: b 22. A small piece of software that adds a feature to 16. Which of the following actions compromise a program or makes a program work better. cyber security? a. Plug in a) Vulnerability b. Browser b) Attack c. Multimedia Player c) Threat d. Streaming Media d) Exploit Answer: a Answer: c 23. Which is not a search engine? 17. Which of the following is the hacking A. Opera approach where cyber-criminals design fake B. Bing websites or pages for tricking or gaining C. Google additional traffic? D. Yahoo a) Pharming Ans: A b) Website-Duplication 24. Which is the first web browser in the world? c) Mimicking A. Gopher d) Spamming B. Worldwideweb Answer: a C. Yahoo 18. Which of the following do Cyber attackers D. Netscape Navigator commonly target for fetching IP address of a Ans: B target or victim user? 25. Which is not a web browser? a) ip tracker A. Chrome b) emails B. Google c) websites C. Opera d) web pages D. Internet Explorer Answer: c Ans: B 19. Which of the following is not a type of peer- 26. What is the short cut key is used to invoke the to-peer cyber-crime? file menu in the Internet Explorer 11? a) MiTM A. Alt+F4 b) Injecting Trojans to a target victim B. Shift+F c) Credit card details leak in the deep web C. Alt+F d) Phishing D. Ctrl+F4 Answer: c Ans: C 27. What is the Internet Explorer? 34. Which of following web browser is developed A. News Reader by MicroSoft? B. Graphics Package A. Edge C. Web Browser B. Chrome D. None C. Firefox Ans: C D. Netscape Navigator 28. What is the shortcut key to open a new tab in Ans: A google chrome? 35. Which shortcut key used to full screen in A. Ctrl+T Google chrome? B. Ctrl+K A. F11 C. Ctrl+N B. F5 D. Ctrl+S C. F10 Ans: A D. F2 29. Internet Explorer was launched in…. Ans: A A. 1987 36. What is the first step to see any website after B. 1995 open the browser? C. 2002 A. To type website address in browser address bar D. 1990 B. To refresh the window Ans: B C. To click on the back button 30. Which Application is used for taking D. To open the internet browser setting information from Internet? Ans: A A. Operating 37. What is the shortcut key for bookmark the B. Web Browser current page in Goolge Chrome? C. MS Word A. Ctrl+D D. System software B. Ctrl+B Ans: B C. Ctrl+Shift+B 31. Which of the following is a browser? D. Ctrl+Shift+K A. Linux Ans: A B. Google 38. Firefox Web browser is developed by C. Safari A. Apple D. None of Above B. IMB Ans: C C. Mozilla Corporation 32. To view information on website through D. Google which Ans: C A. Cable Modem 39. The feature that fills up forms etc B. Web browser automatically with pre set values is C. DNS called………….. D. Facebook A. Filter Ans: B B. Auto Fill 33. Which is graphical web browser developed by C. Fill UP Apple? D. None A. Safari Ans: B B. Firefox 40. Blog is developed which word C. Chrome A. Web Login D. Eadge B. Basic Login Ans: A C. Weblog D. None Ans: C 41. What is Applet? 47. Putting files to the server from the computer A. Program that can be embedded in another is? application A. Downloading B. A tag in HTML B. Uploading C. A security protocol C. Trashing D. None D. Transferring Ans: A Ans: B 42. Client side scripting refers to the class of 48. Which of these is a non-profit domain? computer program on the web that are A. .com executed client side by B. .in A. DNS C. .org B. Website D. All of these C. Web Browser Ans: C D. None 49. The World Wide Web (WWW) was invented Ans: C by ___. 43. What is the internet? A. Steve Jobs A. Programming language B. Tim Berners Lee B. Network connecting computers all over the C. Ray Tomliners world D. All of these C. Computer program to transfer data Ans: B D. All of these 50. In which year email was created? Ans: B A. 1980 43. What is e-mail? B. 1990 A. Method of exchanging messages via electronic C. 1971 devices D. 1975 B. Speed message transfer to location Ans: C C. Musical messaging service D. None of these 51. Who invented email? Ans: A A. Larry Page 44. E-mail stands for? B. Tim Barners A. Electrical mail C. Ray Tomlinson B. Electronic messaging service D. All of these C. Electronic mail Ans: C D. All of these 52. "@" in an email address is used to ___. Ans: C A. Separate username from ISP 45. What does WWW stand for? B. Create password for email A. Working window web C. Add strength to email B. Web window word D. None of these C. World Wide Web Ans: A D. None of these 53. Which of these services is owned by Google? Ans: C A. Yahoo mail 46. What is the URL of a website? B. G-mail A. It is the location of website on internet C. Facebook B. It is used to create internet D. All of these C. It is location of peripheral on internet Ans: B D. None of these Ans: A