0% found this document useful (0 votes)
46 views9 pages

Cyber Security MOC QP

The document contains multiple-choice questions (MCQs) and answers related to Cyber Security for BA courses, covering topics such as definitions, types, features, and objectives of cyber security. It includes questions about internet protocols, web technologies, and cyber crimes, with correct answers provided for each question. The content serves as a study guide for students to understand key concepts in cyber security.

Uploaded by

Prathamesh Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views9 pages

Cyber Security MOC QP

The document contains multiple-choice questions (MCQs) and answers related to Cyber Security for BA courses, covering topics such as definitions, types, features, and objectives of cyber security. It includes questions about internet protocols, web technologies, and cyber crimes, with correct answers provided for each question. The content serves as a study guide for students to understand key concepts in cyber security.

Uploaded by

Prathamesh Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

MCQ Type questions and Answers on Cyber Security Subject for BA Courses

Module 1:- Introduction to Cyber security:

1) What is Cyber Security?


a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned

Answer: d

2) What does cyber security protect?


a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

Answer: b

3) Which of the following is a type of cyber security?


a) Cloud Security
b) Network Security
c) Application Security
d) All of the above

Answer:d

4) What are the features of cyber security?


a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above

Answer: d
5) Which of the following is an objective of network security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above

Answer: d

6) Which of the following is not a cybercrime?


a) Denial of Service
b) Man in the Middle
c) Malware
d) AES

Answer: d

7) Which of the following is a component of cyber security?


a) Internet Of Things
b) AI
c) Database
d) Attacks

Answer: a

8) Which of the following is a type of cyber attack?


a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above

Answer: d

9) Which of the following is not an advantage of cyber security?


a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses

Answer: a
10) “Cyberspace” was coined by _________
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman

Answer: b

11) Which of the following is not an email-related hacking tool?


a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc

Answer: d

12) Which of the following is used to transmit information on the world wide
web?
a) HPPT
b) HTTP
c) HTPS
d) HTPP

Answer: b

13) Which of the following is an example of ‘internet search engine?


a) LINUX
b) Google
c) Windows
d) MS-Word
Answer: - b

14) World Wide Web was invented by


a) Ted Nelson
b) Tim Berners-Lee
c) Linus Torvalds
d) Robert E. Kahn
Answer (b)
15) What does HTML stand for?
a. Hyper Text Markup Language
b. High Text Markup Language
c. Hyper Tabular Markup Language
d. None of these
Answer (a)

16) HTTP stands for


a. Hyper Text Transfer Protocol
b. High Text Transfer Protocol
c. Hyper Text Transfer Process
d. None of the above
Answer (a)

17) XML stands for


a. Extensible Mask Language
b. Extensible Markup Language
c. Extended Markup Language
d. Extension Markup Language
Answer (b)

18) What short name is associated with the World Wide Web?

a) Internet
b) Web
c) Network
d) Google

Answer:- B
19) Which of the following is not an email-related hacking tool?
a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc

Answer:- d

20) What is Cyberspace?


a) A Physical Location
b) A virtual environment created by interconnected computers
c) An alternate reality
d) A fictional concept

Answer :- d

21) The URL Stands for


a) Uniform Resource Locator
b) Universal Resource Language
c) Unidentified Real time Link
d) Universal Remote Locator

Answer :- a

22) The ISP stands for


a) Internet security Protocol
b) Internet Speed Provider
c) Internet Service Provider
d) Internet Search Platform

Answer :- c
23) The Primary goal of cyber security in cyberspace.
a) To facilitate online shopping
b) To eliminate all online risks
c) To protect digital information and systems from threats
d) To increase social media engagement

Answer :- c

24) The role of web server in the web technology


a) Rendering web pages in browsers
b) Storing user data on the internet
c) Hosting and serving web content to clients
d) Protecting against viruses and malware

Answer ;- c

25) The primary function of a web browser


a) To create websites
b) To host websites
c) To access and display web content
d) To manage database system

Answer :- c

26) The Internet browser is developed by the Mozilla Foundation.


a) Chrome
b) Safari
c) Firefox
d) Opera

Answer :- C
27) The standard internet protocol is
a) TCP/IP
b) UDP
c) FTP
d) HTTP

Answer :- A

28) Web pages are saved in which of the following format


a) http://
b) HTML
c) DOC
d) URL

Answer :- b

29) Which of the following is an Internet browser


a) Windows explorer
b) WWW.google.com
c) Internet Explorer
d) Task bar

Answer :- C

30) Which of the following are physical devices of a computer?


a) Hardware
b) Software
c) System Software
d) Package

Answer :- A
31) Which of the following service allows a user to log in to another
computer somewhere on the Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP

Answer :- C

32) The primary purpose of web browser is


a) To host websites
b) To send emails
c) To access and display web content
d) To manage computer files

Answer ;- C

33) The term for a clickable link on a web page that takes to another
web page.
a) Web marker
b) Hyperlink
c) Web token
d) Internet shortcut

Answer :- B
34) What is the process of transferring files from the internet to
computer memory called?
(a) Uploading
(b) Downloading
(c) Bookmarking
(d) HyperInking
Answer:- B

35) The Internet began with the development of


(a) USENET
(b) ARPANET
(c) Ethernet
(d) Intranet
Answer :- B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy