BCA Internet Security Important MCQ
BCA Internet Security Important MCQ
9. Which layer in the OSI model deals with encryption and decryption?
A. Application
B. Presentation
C. Transport
D. Session
Answer: B
10. A cyber attack where attacker floods a server with overwhelming traffic is called:
A. SQL Injection
B. Phishing
C. DoS Attack
D. Packet Sniffing
Answer: C
11. Which technique is used to protect against data interception during communication?
A. Firewall
B. Encryption
C. Malware
D. Social engineering
Answer: B
15. Which organization provides guidelines for Internet security standards globally?
A. ICANN
B. ISO
C. CERT-In
D. IEEE
Answer: B
18. The practice of using multiple layers of defense to protect information is called:
A. Defense in depth
B. Multi-layer encryption
C. Redundant security
D. Intrusion prevention
Answer: A
20. Which tool can detect and prevent intrusion attempts in real-time?
A. IDS
B. IPS
C. Firewall
D. VPN
Answer: B
29. Which cyber law governs electronic contracts and digital signatures in India?
A. IT Act, 2000
B. Cyber Crime Act, 2015
C. Indian Evidence Act, 1872
D. Digital Transactions Act, 2018
Answer: A
30. Which attack involves injecting malicious SQL queries into a website?
A. SQL Injection
B. DoS
C. Phishing
D. Keylogging
Answer: A
34. Which of the following malware hides itself deeply into the operating system to evade detection?
A. Adware
B. Rootkit
C. Spyware
D. Trojan
Answer: B
38. The process of converting plain text into unreadable form is called:
A. Authentication
B. Encryption
C. Hacking
D. Spoofing
Answer: B
41. The process of restoring encrypted files after a ransomware attack is called:
A. Decryption
B. Authentication
C. Data Recovery
D. Hardening
Answer: A