MCQ Cyber Security
MCQ Cyber Security
UNIT 1 MCQ’s
1. What is cyberspace?
a) Physical space where computers are stored
b) Virtual environment where electronic communication occurs
c) Outer space beyond Earth's atmosphere
d) Underwater cables connecting continents
4. The Internet is a:
a) Private network
b) Local network
c) Public network
d) Intranet
Answers:
1. b) Virtual environment where electronic communication occurs
2. a) Email
3. c) Both hardware and software components
4. c) Public network
5. a) Hypertext Transfer Protocol (HTTP)
6. d) 1990s
7. b) Data transfer
8. b) Decentralized management by various organizations
9. a) Group of people who use the Internet
10. c) Establishing laws and policies for online activities
11. b) Protecting information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction
12. c) Too much encryption
Answers:
1. b) Protecting digital information and systems from unauthorized access, use,
disclosure, disruption, modification, or destruction
2. c) Phishing attack
3. b) It secures data by encoding it in a way that only authorized parties can access it
4. b) To filter network traffic and prevent unauthorized access
5. c) Ignoring security alerts
6. b) A technique used to manipulate individuals into divulging confidential information
7. b) To test the effectiveness of cybersecurity measures by simulating cyberattacks
8. d) All of the above
9. a) Sharing passwords with colleagues
10. b) To minimize risk and protect against potential threats
Here are some multiple-choice questions (MCQs) on Defining Cyberspace and Overview of
Computer and Web Technology:
1. What is cyberspace?
a) Physical space where computers are stored
b) Virtual environment where electronic communication occurs
c) The deep ocean where underwater cables are laid
d) The Earth's atmosphere
Answers:
1. b) Virtual environment where electronic communication occurs
2. a) Email
3. c) Both hardware and software components
4. c) Public network
5. b) HTTP (Hypertext Transfer Protocol)
6. b) 1960s
7. b) Sharing data
8. b) International organizations
9. a) Group of people who use the Internet
10. b) Enforcing laws and policies for online activities
Here are some multiple-choice questions (MCQs) on Communication and Web Technology,
Internet, World Wide Web, Advent of Internet, Internet Infrastructure for Data Transfer and
Governance, and Internet Society:
8. Which organization is responsible for assigning IP addresses and managing domain names?
a) IEEE (Institute of Electrical and Electronics Engineers)
b) IETF (Internet Engineering Task Force)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) ITU (International Telecommunication Union)
10. What is one of the main challenges faced by the Internet society?
a) Limited availability of online content
b) Cybersecurity threats and privacy concerns
c) Slow internet speeds
d) Lack of international cooperation
Answers:
1. b) To facilitate the exchange of information and messages between individuals or
systems
2. b) Global network of interconnected computers and devices
3. b) A system of interconnected hypertext documents accessed via the Internet
4. b) 1960s
5. b) Data transfer
6. b) International organizations
7. a) Group of people who use the Internet
8. c) ICANN (Internet Corporation for Assigned Names and Numbers)
9. b) To ensure the stable and secure operation of the Internet
10. b) Cybersecurity threats and privacy concerns
Regulation of Cyberspace:
Concept of Cybersecurity:
Answers:
1. c) Establishing laws and policies for online activities
2. c) Individual countries
3. b) To protect individuals and organizations from cybercrimes and threats
4. b) Protecting information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction
5. c) Implementing firewalls and antivirus software
6. b) Inadequate cybersecurity measures
7. b) Data breaches and cyberattacks
8. b) It reduces the likelihood of successful cyberattacks
Reference Links
1. https://www.sanfoundry.com/1000-cyber-security-questions-answers/
2. https://www.javatpoint.com/cyber-security-mcq
3. https://unacademy.com/content/gate/mcqs/cyber-security/
4. https://byjus.com/gate/cyber-security-mcqs/
5. https://www.theknowledgeacademy.com/blog/cyber-security-mcq-and-answers/
UNIT 2 MCQ’s
10. What are some remedial and mitigation measures against cybercrimes?
a) Ignoring cybersecurity altogether
b) Implementing strong passwords and multi-factor authentication
c) Sharing personal information online freely
d) Disabling antivirus software
Answers:
1. c) Intent of the perpetrator
2. a) Phishing
3. c) Online harassment and exploitation
4. c) Online banking scams
5. b) Manipulation of human psychology
6. a) Encrypting data for ransom
7. b) Attacks that exploit previously unknown vulnerabilities
8. c) Their method of operation or approach
9. c) Enable investigation and prosecution
10. b) Implementing strong passwords and multi-factor authentication
11. b) IT Act 2000
12. d) Computer Emergency Response Team-India (CERT-In)
Answers:
1. b) Online banking scams
2. c) SIM card cloning
3. c) Social engineering attacks
4. b) Obtaining sensitive information or financial gain
5. c) Physical graffiti
Here are some multiple-choice questions (MCQs) on cybercrime against women and children:
4. What is cyberbullying?
a) A form of online shopping fraud
b) An online attack targeting businesses
c) Harassment or intimidation using digital communication platforms
d) None of the above
5. How can cybercrime against women and children impact their well-being?
a) It can lead to financial losses
b) It can cause emotional trauma and psychological harm
c) It can improve their cybersecurity skills
d) It can enhance their social reputation
Answers:
1. c) Online harassment and exploitation
2. c) Cyberbullying
3. c) Causing emotional distress or harm
4. c) Harassment or intimidation using digital communication platforms
5. b) It can cause emotional trauma and psychological harm
Here are some multiple-choice questions (MCQs) on financial frauds and social engineering
attacks:
Financial Frauds:
Answers:
Financial Frauds:
1. a) Phishing attacks
2. b) By impersonating legitimate entities to obtain financial information
3. b) Obtaining financial gain through fraudulent means
Here are some multiple-choice questions (MCQs) on malware and ransomware attacks:
1. What is malware?
a) Software designed to protect computers
b) Software designed to damage, disrupt, or gain unauthorized access to a computer system
c) Software designed to enhance system performance
d) Software designed to improve network security
8. What action should you take if your computer is infected with ransomware?
a) Ignore it and continue using your computer
b) Pay the ransom immediately
c) Disconnect the infected computer from the network and seek professional help
d) Post about it on social media for assistance
Answers:
1. b) Software designed to damage, disrupt, or gain unauthorized access to a computer
system
2. b) It blocks access to a system or files until a ransom is paid
3. b) By exploiting vulnerabilities in software or operating systems
4. c) Firewall
5. b) To encrypt files and demand payment for decryption
6. c) Keeping software and operating systems up to date
7. b) By exploiting software vulnerabilities and security flaws
8. c) Disconnect the infected computer from the network and seek professional help
9. c) Ransomware attacks encrypt files and demand payment for decryption
10. d) A vulnerability that has not yet been discovered or patched by the software vendor.
Here are some multiple-choice questions (MCQs) on zero-day and zero-click attacks:
Answers:
1. d) A vulnerability that has not yet been discovered or patched by the software vendor
2. b) An attack that targets zero devices
3. c) An attack that exploits a vulnerability that is unknown to the software vendor
4. b) By exploiting a vulnerability in the software without any interaction from the user
5. c) They can occur without any interaction from the user
6. c) To gain unauthorized access to the user's device
7. a) Keeping software and operating systems up to date
8. b) Zero-click attacks do not require any interaction from the user
9. c) They are unknown to the software vendor and have no available patch
10. d) Exploiting a vulnerability in the Bluetooth protocol
2. What is phishing?
a) A technique used to encrypt files and demand ransom
b) A method of social engineering where attackers attempt to deceive individuals into
providing sensitive information
c) A type of denial-of-service attack
d) A form of encryption used to protect data during transmission
4. What is ransomware?
a) Malware that spreads through social media platforms
b) Malware designed to steal financial information
c) Malware that encrypts files and demands payment for decryption
d) Malware that targets specific individuals through personalized attacks
7. What is a keylogger?
a) A physical device used to record keystrokes on a keyboard
b) A software program that captures keystrokes on a computer or mobile device
c) A type of malware that encrypts files and demands payment for decryption
d) A form of encryption used to protect sensitive data
10. What is the term used to describe the practice of using multiple layers of security controls
to protect against cyber threats?
a) Single-factor authentication
b) Multi-factor authentication
c) Defense-in-depth
d) Endpoint security
Answers:
1. a) Sending unsolicited emails with attachments
2. b) A method of social engineering where attackers attempt to deceive individuals into
providing sensitive information
3. c) Manipulating individuals into divulging confidential information
4. c) Malware that encrypts files and demands payment for decryption
5. c) Financial data
6. b) An attack that floods a network or server with traffic to disrupt normal operations
7. b) A software program that captures keystrokes on a computer or mobile device
8. c) To exploit vulnerabilities in web applications and gain unauthorized access to a
database
9. a) Hosting malware on legitimate websites
10. c) Defense-in-depth
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
Here are some multiple-choice questions (MCQs) covering reporting of cybercrimes, remedial
and mitigation measures, and the legal perspective of cybercrime:
Reporting of Cybercrimes:
8. Which legal principle states that individuals are responsible for their actions online?
a) Digital anonymity
b) Cyber sovereignty
c) Cyber jurisdiction
d) Cyber attribution
Answers:
1. b) Immediately after detecting any suspicious activity
2. b) Federal Bureau of Investigation (FBI)
3. b) Detailed description of the incident, including any evidence
4. b) To recover lost data and restore affected systems
5. c) Installing antivirus software and keeping it updated
6. b) By providing cybersecurity training to employees
7. c) To define and punish illegal activities conducted online
8. d) Cyber attribution
9. b) To analyze digital evidence to identify and catch cybercriminals
Here are some multiple-choice questions (MCQs) on the Information Technology (IT) Act of
2000 and its amendments:
1. What is the primary objective of the Information Technology (IT) Act of 2000?
a) To promote the use of traditional communication methods
b) To regulate the use of electronic commerce
c) To establish guidelines for social media platforms
d) To discourage the use of information technology
2. Which body is responsible for implementing the provisions of the IT Act in India?
a) Ministry of Health and Family Welfare
b) Ministry of Electronics and Information Technology
c) Ministry of Agriculture and Farmers Welfare
d) Ministry of Housing and Urban Affairs
6. Which amendment to the IT Act of 2000 introduced the concept of "intermediaries" and their
liabilities?
a) IT Amendment Act, 2006
b) IT Amendment Act, 2008
c) IT Amendment Act, 2011
d) IT Amendment Act, 2013
8. Which amendment to the IT Act of 2000 introduced provisions related to the punishment for
cyber terrorism?
a) IT Amendment Act, 2006
b) IT Amendment Act, 2008
c) IT Amendment Act, 2011
d) IT Amendment Act, 2013
9. What aspect of cybercrime does the IT Amendment Act, 2011 primarily address?
a) Protection of critical infrastructure
b) Punishment for cyber terrorism
c) Regulation of online content
d) Protection of personal data and information
Answers:
1. b) To regulate the use of electronic commerce
2. b) Ministry of Electronics and Information Technology
3. b) Protection of personal data and information
4. a) IT Amendment Act, 2006
5. b) It expanded the definition of "cyber terrorism"
6. c) IT Amendment Act, 2011
7. b) To grant immunity to intermediaries for content posted by users
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
Here are multiple-choice questions (MCQs) covering cyber-crime and offences, organizations
dealing with cybercrime and cybersecurity in India, and case studies:
5. What is the primary role of CERT-In (Indian Computer Emergency Response Team)?
a) To regulate social media platforms
b) To provide cybersecurity incident response and coordination
c) To conduct cybercrime investigations
d) To develop gaming software
6. Which organization is responsible for formulating policies and strategies for cybersecurity
in India?
a) National Technical Research Organisation (NTRO)
b) Indian Computer Emergency Response Team (CERT-In)
c) National Cyber Security Coordinator
d) Ministry of Electronics and Information Technology (MeitY)
Case Studies:
7. A company's financial data was stolen by hackers who infiltrated their network. What type
of cybercrime does this scenario represent?
a) Identity theft
b) Cyber espionage
c) Data breach
d) Phishing attack
8. An individual received an email claiming to be from their bank, requesting personal banking
information. Upon investigation, it was found to be a scam. What type of cybercrime does this
scenario represent?
a) Phishing
b) Ransomware attack
c) DDoS attack
d) Insider threat
9. A government organization's website was defaced by hackers who replaced the homepage
with unauthorized content. What type of cybercrime does this scenario represent?
a) Cyber terrorism
b) Insider threat
c) Website defacement
d) Malware attack
Answers:
Reference Links:
1. https://www.sanfoundry.com/cyber-security-questions-answers-cyber-laws-it-laws-1/
2. https://lawbhoomi.com/mcq-question-bank-on-cyber-law/
3. https://www.sanfoundry.com/1000-cyber-security-questions-answers/
4. https://www.studocu.com/in/document/rashtrasant-tukadoji-maharaj-nagpur-university/cyber-
security/multiple-choice-questions-of-cyber-law/12358015
5. https://gtu-mcq.com/BE/Electrical-Engineering/Semester-
6/3161925/5712/MCQs?q=9aZHDjblmRk=
6. https://letsfindcourse.com/cyber-security-mcq/malware-mcq-questions-and-answers
UNIT 3 MCQ’s
1. What is a social network primarily designed for?
a) Sharing physical addresses
b) Connecting individuals and groups online
c) Buying and selling products
d) Playing video games
4. What is a hashtag?
a) A type of social media profile
b) A symbol used to mark keywords or topics in a post
c) A measure of social media popularity
d) A type of viral content
10. What is the purpose of flagging and reporting inappropriate content on social media?
a) To increase the popularity of the content
b) To encourage others to post similar content
c) To notify platform administrators for removal or action
d) None of the above
11. What laws govern the posting of inappropriate content on social media?
a) Social Media Act
b) Digital Content Regulation Act
c) There are no specific laws
d) Internet Privacy Act
12. What are some best practices for the use of social media?
a) Sharing personal information freely
b) Engaging in online arguments
c) Verifying information before sharing
d) Ignoring privacy settings
Answers:
1. b) Connecting individuals and groups online
2. c) Online marketplaces
3. b) Monitoring online conversations and activities
4. b) A symbol used to mark keywords or topics in a post
5. a) Spreads rapidly across multiple platforms
6. b) Promoting brands and products through social media platforms
7. a) Excessive sharing of personal information
8. d) All of the above
9. d) All of the above
10. c) To notify platform administrators for removal or action
11. c) There are no specific laws
12. c) Verifying information before sharing
Reference Links:
1. https://testbook.com/objective-questions/mcq-on-social-media--
626bbbb81a305a657899de22
2. https://t4tutorials.com/social-networks-mcqs-solved-questions-answers/
3. https://www.includehelp.com/mcq/social-media-marketing-smm-mcqs.aspx
4. https://www.sanfoundry.com/cyber-security-questions-answers-social-networking-
security/
UNIT 4 MCQ’s
E-Commerce:
Digital Payments:
12. What guidelines does RBI provide regarding digital payments and customer protection?
a) Regularly share sensitive information online
b) Ensure encryption of payment data
c) Ignore suspicious transactions
d) None of the above
Answers:
1. b) Electronic commerce involving the buying and selling of goods and services over the
internet
2. c) Buyers, sellers, products, and transactions
3. d) Unsecured connections
4. c) Data breaches and cyberattacks
5. c) Regular security audits and updates
6. c) Global market access
7. b) Identifying market trends and competitors
8. c) Money transfer and authentication
9. c) Physical currency
10. a) Transfer of funds via mobile phones
11. b) Phishing attacks and identity theft
12. b) Ensure encryption of payment data
Here are some multiple-choice questions (MCQs) covering the definition of e-commerce and
its main components:
Definition of E-Commerce:
Answers:
E-Commerce Threats:
4. What type of attack aims to overwhelm a website with excessive traffic, making it
unavailable to legitimate users?
a) Phishing attack
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
Advantages of E-Commerce:
9. Which of the following is a popular e-commerce site known for selling a wide range of
products and offering fast shipping options?
a) Amazon
b) LinkedIn
c) Twitter
d) Netflix
10. Which e-commerce site specializes in handmade or vintage items and craft supplies?
a) Etsy
b) Alibaba
c) eBay
d) Walmart
Answers:
5. Which mode of digital payment involves using a plastic card issued by a bank to make
transactions?
a) Unified Payment Interface (UPI)
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
b) e-Wallets
c) Banking Cards
d) Unstructured Supplementary Service Data (USSD)
7. Which mode of digital payment allows users to store multiple payment methods, such as
credit cards, debit cards, and bank accounts, in a single digital platform?
a) Unified Payment Interface (UPI)
b) e-Wallets
c) Banking Cards
d) Unstructured Supplementary Service Data (USSD)
8. What technology does Unstructured Supplementary Service Data (USSD) use for
transactions?
a) Internet connectivity
b) SMS or text messaging
c) Near Field Communication (NFC)
d) Bluetooth connectivity
Answers:
3. What is a common type of fraud in digital payments where a fake website or email is used
to deceive users into providing personal or financial information?
a) Identity theft
b) Phishing
c) Insider fraud
d) Data breach
4. How can users prevent falling victim to phishing attacks in digital payments?
a) Click on links provided in unsolicited emails
b) Share personal and financial information freely
c) Verify the authenticity of websites and emails before providing any information
d) Ignore security warnings from browsers
Answers:
1. b) A payment system that uses the Aadhaar number and biometric authentication
2. b) Reduced risk of fraud due to biometric authentication
3. b) Phishing
4. c) Verify the authenticity of websites and emails before providing any information
5. c) To promote customer protection and safety in digital transactions
6. c) To provide recourse and compensation to customers in case of unauthorized
transactions
Here are some multiple-choice questions (MCQs) on relevant provisions of the Payment and
Settlement Systems Act, 2007:
1. The Payment and Settlement Systems Act, 2007, in India, primarily aims to regulate which
of the following?
a) Banking transactions
b) Stock market transactions
c) Payment and settlement systems
d) Real estate transactions
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
2. Which regulatory body is responsible for overseeing and regulating payment and settlement
systems in India under the Payment and Settlement Systems Act, 2007?
a) Securities and Exchange Board of India (SEBI)
b) Reserve Bank of India (RBI)
c) Insurance Regulatory and Development Authority of India (IRDAI)
d) Ministry of Finance
3. Under the Payment and Settlement Systems Act, 2007, who is required to obtain
authorization from the Reserve Bank of India to operate a payment system?
a) Only government-owned entities
b) Only private companies
c) All entities operating payment systems
d) Entities operating small-scale payment systems
4. Which of the following is NOT a key objective of the Payment and Settlement Systems Act,
2007?
a) Ensuring the stability and efficiency of payment systems
b) Protecting the interests of consumers in payment transactions
c) Facilitating competition and innovation in payment systems
d) Promoting cash transactions over digital payments
5. The Payment and Settlement Systems Act, 2007, empowers the Reserve Bank of India to
issue regulations related to which of the following aspects?
a) Only technical standards for payment systems
b) Licensing and operation of payment systems
c) Only consumer protection in payment transactions
d) None of the above
6. Under the Payment and Settlement Systems Act, 2007, what are the consequences for
operating a payment system without obtaining authorization from the Reserve Bank of India?
a) No consequences
b) A warning letter from the Reserve Bank of India
c) Penalties, including fines and imprisonment
d) Suspension of banking license
Answers:
1. c) Payment and settlement systems
2. b) Reserve Bank of India (RBI)
3. c) All entities operating payment systems
4. d) Promoting cash transactions over digital payments
5. b) Licensing and operation of payment systems
6. c) Penalties, including fines and imprisonment
Reference Links:
1. https://unacademy.com/content/gate/mcqs/e-commerce-mcqs/
2. https://testbook.com/objective-questions/mcq-on-e-commerce--
5eea6a1439140f30f369f2c2
3. https://www.examveda.com/commerce/practice-mcq-question-on-ecommerce/
4. https://byjus.com/gate/e-commerce-mcqs/
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
UNIT 5 MCQ’s
1. What is an endpoint device?
a) A device at the beginning of a network
b) A device at the end of a network
c) A device used for gaming only
d) A device without any internet connection
Answers:
1. b) A device at the end of a network
2. b) To prevent unauthorized access to data and applications
3. b) Using complex passwords with a combination of letters, numbers, and special
characters
4. b) Managing updates to software to address security vulnerabilities
5. c) To protect against data loss due to hardware failure, theft, or malware
6. a) Trustworthiness and reliability of the source
7. b) A policy that restricts access to devices based on user roles and responsibilities
8. c) Regularly updating software and antivirus programs
9. c) To protect against unauthorized network access and malware
10. b) By updating them regularly and configuring them for optimal protection
11. c) Protecting the wireless network from unauthorized access and data interception
12. b) Limited access based on user roles and responsibilities
Here are some multiple-choice questions (MCQs) on end-point device and mobile phone
security, as well as password policy:
**Password Policy:**
Answers:
Here are some multiple-choice questions (MCQs) on password policy, security patch
management, and data backup:
Password Policy:
Data Backup:
Answers:
4. b) To ensure that software and systems are up to date with the latest security patches
and updates
5. c) To address known vulnerabilities and protect against potential cyber threats
6. c) To restore data in case of data loss or corruption
7. b) Storing backups in an off-site location
Here are some multiple-choice questions (MCQs) on downloading and management of third-
party software, device security policy, cybersecurity best practices, and the significance of host
firewall and antivirus:
Answers:
Here are some multiple-choice questions (MCQs) on the management of host firewall and
antivirus, Wi-Fi security, and configuration of basic security policy and permissions:
Wi-Fi Security:
3. What is a common security risk associated with using open or unsecured Wi-Fi networks?
a) Increased network speed
CYBER SECURITY (SEC) - MCQ
CYBER SECURITY (SEC) - MCQ
6. Which of the following is an example of a security policy that can be configured on a device?
a) Allowing unrestricted access to all users
b) Requiring multi-factor authentication for accessing sensitive data
c) Ignoring software updates
d) Disabling password protection
Answers:
1. https://www.sanfoundry.com/cyber-security-questions-answers-mobile-phone-
security/
2. https://priyadogra.com/endpoint-quiz-answers-nse-2-information-security-awareness-
fortinet/
3. https://letsfindcourse.com/cyber-security-mcq/mobile-security-mcq-questions-and-
answers
4. https://www.sanfoundry.com/cyber-security-questions-answers-windows-security/
5. https://www.engineeringmcq.com/computer-science/information-security/19.php
6. https://www.sanfoundry.com/cyber-security-questions-answers-firewalls-1/