0% found this document useful (0 votes)
47 views4 pages

Web Surfing and Cyber Security-1

Cybersecurity

Uploaded by

arti00249
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views4 pages

Web Surfing and Cyber Security-1

Cybersecurity

Uploaded by

arti00249
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit IV: Web Surfing and Cyber security. 7.

Which of the following is an objective of


5th Semester Co-curricular course network security?
a) Confidentiality
(MCQs with answers) b) Integrity
c) Availability
d) All of the above
1. What is Cyber Security?
Answer: d
a) Cyber Security provides security against
8. Which of the following is not a cybercrime?
malware
a) Denial of Service
b) Cyber Security provides security against
b) Man in the Middle
cyber-terrorists
c) Malware
c) Cyber Security protects a system from
d) AES (Advanced Encryption Standard)
cyber attacks
Answer: d
d) All of the mentioned
9. Which of the following is a component of
Answer: d
cyber security?
2. What does cyber security protect?
a) Internet Of Things
a) Cyber security protects criminals
b) AI
b) Cyber security protects internet-connected
c) Database
systems
d) Attacks
c) Cyber security protects hackers
Answer: a
d) None of the mentioned
10. Which of the following is a type of cyber
Answer: b
attack?
3. Who is the father of computer security?
a) Phishing
a) August Kerckhoffs
b) SQL Injections
b) Bob Thomas
c) Password Attack
c) Robert
d) All of the above
d) Charles
Answer: d
Answer: a
11. Which of the following is not an advantage of
4. Which of the following is defined as an
cyber security?
attempt to steal, spy, damage or destroy
a) Makes the system slower
computer systems, networks, or their
b) Minimizes computer freezing and crashes
associated information?
c) Gives privacy to users
a) Cyber attack
d) Protects system against viruses
b) Computer security
Answer: a
c) Cryptography
12. “Cyberspace” was coined by _________
d) Digital hacking
a) Richard Stallman
Answer: a
b) William Gibson
5. Which of the following is a type of cyber
c) Andrew Tannenbaum
security?
d) Scott Fahlman
a) Cloud Security
Answer: b
b) Network Security
13. In which year has hacking become a practical
c) Application Security
crime and a matter of concern in the field of
d) All of the above
cyber technology?
Answer: d
a) 1991
6. What are the features of cyber security?
b) 1983
a) Compliance
c) 1970
b) Defense against internal threats
d) 1964
c) Threat Prevention
Answer: c
d) All of the above
Answer: d
14. Governments hired some highly skilled 20. Which of the following is defined as an
hackers for providing cyber security for the attempt to harm, damage or cause threat to a
country or state. These types of hackers are system or network?
termed as _______ a) Digital crime
a) Nation / State sponsored hackers b) Threats
b) CIA triad c) System hijacking
c) Special Hackers d) Cyber Attack
d) Government Hackers Answer: d
Answer: a 21. Computers on the internet communicate with
15. Which of the following act violates cyber each other using the ___________ protocol.
security? a) HTTP
a) Exploit b) SMTP
b) Attack c) FTP
c) Threat d) TCP/IP
d) Vulnerability Answer: a
Answer: b 22. A small piece of software that adds a feature to
16. Which of the following actions compromise a program or makes a program work better.
cyber security? a. Plug in
a) Vulnerability b. Browser
b) Attack c. Multimedia Player
c) Threat d. Streaming Media
d) Exploit Answer: a
Answer: c 23. Which is not a search engine?
17. Which of the following is the hacking A. Opera
approach where cyber-criminals design fake B. Bing
websites or pages for tricking or gaining C. Google
additional traffic? D. Yahoo
a) Pharming Ans: A
b) Website-Duplication 24. Which is the first web browser in the world?
c) Mimicking A. Gopher
d) Spamming B. Worldwideweb
Answer: a C. Yahoo
18. Which of the following do Cyber attackers D. Netscape Navigator
commonly target for fetching IP address of a Ans: B
target or victim user? 25. Which is not a web browser?
a) ip tracker A. Chrome
b) emails B. Google
c) websites C. Opera
d) web pages D. Internet Explorer
Answer: c Ans: B
19. Which of the following is not a type of peer- 26. What is the short cut key is used to invoke the
to-peer cyber-crime? file menu in the Internet Explorer 11?
a) MiTM A. Alt+F4
b) Injecting Trojans to a target victim B. Shift+F
c) Credit card details leak in the deep web C. Alt+F
d) Phishing D. Ctrl+F4
Answer: c Ans: C
27. What is the Internet Explorer? 34. Which of following web browser is developed
A. News Reader by MicroSoft?
B. Graphics Package A. Edge
C. Web Browser B. Chrome
D. None C. Firefox
Ans: C D. Netscape Navigator
28. What is the shortcut key to open a new tab in Ans: A
google chrome? 35. Which shortcut key used to full screen in
A. Ctrl+T Google chrome?
B. Ctrl+K A. F11
C. Ctrl+N B. F5
D. Ctrl+S C. F10
Ans: A D. F2
29. Internet Explorer was launched in…. Ans: A
A. 1987 36. What is the first step to see any website after
B. 1995 open the browser?
C. 2002 A. To type website address in browser address bar
D. 1990 B. To refresh the window
Ans: B C. To click on the back button
30. Which Application is used for taking D. To open the internet browser setting
information from Internet? Ans: A
A. Operating 37. What is the shortcut key for bookmark the
B. Web Browser current page in Goolge Chrome?
C. MS Word A. Ctrl+D
D. System software B. Ctrl+B
Ans: B C. Ctrl+Shift+B
31. Which of the following is a browser? D. Ctrl+Shift+K
A. Linux Ans: A
B. Google 38. Firefox Web browser is developed by
C. Safari A. Apple
D. None of Above B. IMB
Ans: C C. Mozilla Corporation
32. To view information on website through D. Google
which Ans: C
A. Cable Modem 39. The feature that fills up forms etc
B. Web browser automatically with pre set values is
C. DNS called…………..
D. Facebook A. Filter
Ans: B B. Auto Fill
33. Which is graphical web browser developed by C. Fill UP
Apple? D. None
A. Safari Ans: B
B. Firefox 40. Blog is developed which word
C. Chrome A. Web Login
D. Eadge B. Basic Login
Ans: A C. Weblog
D. None
Ans: C
41. What is Applet? 47. Putting files to the server from the computer
A. Program that can be embedded in another is?
application A. Downloading
B. A tag in HTML B. Uploading
C. A security protocol C. Trashing
D. None D. Transferring
Ans: A Ans: B
42. Client side scripting refers to the class of 48. Which of these is a non-profit domain?
computer program on the web that are A. .com
executed client side by B. .in
A. DNS C. .org
B. Website D. All of these
C. Web Browser Ans: C
D. None 49. The World Wide Web (WWW) was invented
Ans: C by ___.
43. What is the internet? A. Steve Jobs
A. Programming language B. Tim Berners Lee
B. Network connecting computers all over the C. Ray Tomliners
world D. All of these
C. Computer program to transfer data Ans: B
D. All of these 50. In which year email was created?
Ans: B A. 1980
43. What is e-mail? B. 1990
A. Method of exchanging messages via electronic C. 1971
devices D. 1975
B. Speed message transfer to location Ans: C
C. Musical messaging service
D. None of these 51. Who invented email?
Ans: A A. Larry Page
44. E-mail stands for? B. Tim Barners
A. Electrical mail C. Ray Tomlinson
B. Electronic messaging service D. All of these
C. Electronic mail Ans: C
D. All of these 52. "@" in an email address is used to ___.
Ans: C A. Separate username from ISP
45. What does WWW stand for? B. Create password for email
A. Working window web C. Add strength to email
B. Web window word D. None of these
C. World Wide Web Ans: A
D. None of these 53. Which of these services is owned by Google?
Ans: C A. Yahoo mail
46. What is the URL of a website? B. G-mail
A. It is the location of website on internet C. Facebook
B. It is used to create internet D. All of these
C. It is location of peripheral on internet Ans: B
D. None of these
Ans: A

You might also like