0% found this document useful (0 votes)
10 views9 pages

BCA Internet Security Important MCQ

The document contains 50 multiple-choice questions (MCQs) related to Internet security, covering topics such as malware, firewalls, encryption, and cyber attacks. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in cybersecurity. It serves as a study guide for students in the BCA final semester.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views9 pages

BCA Internet Security Important MCQ

The document contains 50 multiple-choice questions (MCQs) related to Internet security, covering topics such as malware, firewalls, encryption, and cyber attacks. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in cybersecurity. It serves as a study guide for students in the BCA final semester.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Internet Security (BCA Final Semester) - 50 Important MCQs

1. Which of the following is NOT an example of malware?


A. Worm
B. Trojan horse
C. Firewall
D. Ransomware
Answer: C

2. What is the primary purpose of a firewall?


A. To encrypt data
B. To block unauthorized access to or from a network
C. To monitor CPU usage
D. To install updates
Answer: B

3. Which of the following is a form of social engineering attack?


A. SQL Injection
B. Phishing
C. Virus
D. Brute Force Attack
Answer: B

4. A software that logs keystrokes to steal sensitive data is called:


A. Adware
B. Spyware
C. Keylogger
D. Rootkit
Answer: C

5. Which of the following is the strongest form of authentication?


A. Password only
B. Password + OTP
C. Password + Biometrics + OTP
D. Captcha
Answer: C

6. Which protocol is used to securely transfer files over the Internet?


A. FTP
B. SFTP
C. HTTP
D. POP3
Answer: B

7. Which of the following is NOT an example of encryption algorithm?


A. AES
B. RSA
C. DES
D. SQL
Answer: D

8. What does SSL stand for?


A. Secure Socket Layer
B. Secure System Link
C. Safe Socket Line
D. System Secure Layer
Answer: A

9. Which layer in the OSI model deals with encryption and decryption?
A. Application
B. Presentation
C. Transport
D. Session
Answer: B

10. A cyber attack where attacker floods a server with overwhelming traffic is called:
A. SQL Injection
B. Phishing
C. DoS Attack
D. Packet Sniffing
Answer: C

11. Which technique is used to protect against data interception during communication?
A. Firewall
B. Encryption
C. Malware
D. Social engineering
Answer: B

12. Which of the following is NOT a two-factor authentication method?


A. Password + OTP
B. Password + Smart Card
C. Password + PIN
D. Password only
Answer: D

13. Which malware disguises itself as legitimate software?


A. Virus
B. Trojan Horse
C. Spyware
D. Worm
Answer: B

14. What is the primary goal of penetration testing?


A. To strengthen system performance
B. To find security vulnerabilities
C. To delete malware
D. To monitor network speed
Answer: B

15. Which organization provides guidelines for Internet security standards globally?
A. ICANN
B. ISO
C. CERT-In
D. IEEE
Answer: B

16. HTTPS uses which encryption protocol?


A. SSL/TLS
B. FTP
C. TCP
D. UDP
Answer: A

17. Which of the following is a physical security measure?


A. Antivirus software
B. Strong password
C. Biometric authentication
D. Firewall
Answer: C

18. The practice of using multiple layers of defense to protect information is called:
A. Defense in depth
B. Multi-layer encryption
C. Redundant security
D. Intrusion prevention
Answer: A

19. Which type of malware spreads without human interaction?


A. Virus
B. Worm
C. Rootkit
D. Spyware
Answer: B

20. Which tool can detect and prevent intrusion attempts in real-time?
A. IDS
B. IPS
C. Firewall
D. VPN
Answer: B

21. What does VPN do?


A. Protect against viruses
B. Encrypt internet traffic and hide IP address
C. Monitor online activities
D. Block pop-up ads
Answer: B

22. Which form of backup offers real-time data replication?


A. Full backup
B. Incremental backup
C. Continuous Data Protection (CDP)
D. Differential backup
Answer: C

23. A Brute Force attack attempts to:


A. Flood a server with requests
B. Guess passwords using all possible combinations
C. Install a keylogger
D. Scan open ports
Answer: B

24. Which of the following protocols uses port 443?


A. HTTP
B. HTTPS
C. FTP
D. SMTP
Answer: B

25. Which of the following is an example of Public Key Cryptography?


A. AES
B. DES
C. RSA
D. MD5
Answer: C

26. Which of the following protocols is used to send email?


A. SMTP
B. IMAP
C. POP3
D. HTTP
Answer: A

27. What does MITM (Man-in-the-Middle) attack mean?


A. Attacker intercepts communication between two parties
B. Attack on website login forms
C. Virus spreads via removable drives
D. Hardware malfunction attack
Answer: A

28. Which is NOT a valid hashing algorithm?


A. MD5
B. SHA-256
C. AES
D. SHA-1
Answer: C

29. Which cyber law governs electronic contracts and digital signatures in India?
A. IT Act, 2000
B. Cyber Crime Act, 2015
C. Indian Evidence Act, 1872
D. Digital Transactions Act, 2018
Answer: A

30. Which attack involves injecting malicious SQL queries into a website?
A. SQL Injection
B. DoS
C. Phishing
D. Keylogging
Answer: A

31. Which is an example of Symmetric Encryption?


A. RSA
B. AES
C. ECC
D. DSA
Answer: B

32. Which of the following ports is used by FTP?


A. 21
B. 22
C. 25
D. 110
Answer: A

33. A honeypot is used to:


A. Monitor attackers and study their behavior
B. Strengthen user authentication
C. Scan for viruses
D. Encrypt communications
Answer: A

34. Which of the following malware hides itself deeply into the operating system to evade detection?
A. Adware
B. Rootkit
C. Spyware
D. Trojan
Answer: B

35. In Internet security, CIA Triad stands for:


A. Confidentiality, Integrity, Availability
B. Cybersecurity, Integrity, Authentication
C. Confidentiality, Information, Authorization
D. Cryptography, Integrity, Accessibility
Answer: A

36. Which is a stronger password policy?


A. Only lowercase letters
B. Letters and numbers
C. Letters, numbers, symbols, and both cases
D. Only birthdate
Answer: C

37. What does Patch Management mean?


A. Installing antivirus software
B. Updating software to fix vulnerabilities
C. Hiding IP address
D. Encrypting hard drives
Answer: B

38. The process of converting plain text into unreadable form is called:
A. Authentication
B. Encryption
C. Hacking
D. Spoofing
Answer: B

39. Which is a popular tool used for network scanning?


A. Nmap
B. Notepad
C. Wireshark
D. SQLmap
Answer: A

40. Which attack spoofs a website to steal login credentials?


A. DNS Spoofing
B. Phishing
C. Ransomware
D. DoS
Answer: B

41. The process of restoring encrypted files after a ransomware attack is called:
A. Decryption
B. Authentication
C. Data Recovery
D. Hardening
Answer: A

42. Which of the following is an intrusion detection system (IDS)?


A. Snort
B. Wireshark
C. Metasploit
D. Nmap
Answer: A

43. What is Social Engineering in the context of security?


A. Programming social media apps
B. Manipulating people into revealing confidential info
C. Engineering network hardware
D. Creating software viruses
Answer: B

44. Which is an example of spyware?


A. Adware
B. Keylogger
C. Worm
D. Trojan
Answer: B

45. Public key is used for:


A. Encryption in symmetric cryptography
B. Decryption in symmetric cryptography
C. Encryption in asymmetric cryptography
D. Virus removal
Answer: C

46. A tool that captures packets traveling over a network is called:


A. IDS
B. Packet Sniffer
C. Firewall
D. VPN
Answer: B

47. Zero-day vulnerability means:


A. Vulnerability already patched
B. Recently discovered vulnerability with no fix
C. Virus that activates after 30 days
D. Weak password attack
Answer: B

48. What does CIA triad emphasize for Integrity?


A. Ensuring accuracy and consistency of data
B. Preventing data access
C. Ensuring system availability
D. Encrypting data
Answer: A

49. What is Two-step verification also known as?


A. Dual-layer encryption
B. Multi-Factor Authentication (MFA)
C. Two-way tunneling
D. Secure login
Answer: B

50. Which of the following strengthens network security by isolating users?


A. VLAN (Virtual LAN)
B. VPN
C. SSL
D. IDS
Answer: A

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy