Saturday 30 January 2021

Cyber Security MCQ Part - 01

 

 Cyber Security MCQ Part - 01


1.      Which of the following is not a type of virus?

a) Boot sector

b) Polymorphic

c) Multipartite

d) Trojans

2.      A computer ________ is a malicious code which self-replicates by copying itself to other programs.

a) program

b) virus

c) application

d) worm

3.      Which of them is not an ideal way of spreading the virus?

a) Infected website

b) Emails

c) Official Antivirus CDs

d) USBs

4.      In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

a) Apple I

b) Apple II

c) Apple III

d) Apple Virus

5.      _______________ infects the master boot record and it is challenging and a complex task to remove this virus.

a) Boot Sector Virus

b) Polymorphic

c) Multipartite

d) Trojans

6.       ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

a) Boot Sector Virus

b) Direct Action Virus

c) Polymorphic Virus

d) Multipartite Virus

7.      Direct Action Virus is also known as ___________

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

8.      ______________ infects the executables as well as the boot sectors.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

9.      ______________ are difficult to identify as they keep on changing their type and signature.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

10.   ____________ deletes all the files that it infects.

a) Non-resident virus

b) Overwrite Virus

c) Polymorphic Virus

d) Multipartite Virus

11.   _____________ is also known as cavity virus.

a) Non-resident virus

b) Overwrite Virus

c) Polymorphic Virus

d) Space-filler Virus

12.   Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

a) Research purpose

b) Pranks

c) Identity theft

d) Protection

13.      A ___________ is a small malicious program that runs hidden on infected system.

a) Virus

b) Trojan

c) Shareware

d) Adware

14.      ____________ works in background and steals sensitive data.

a) Virus

b) Shareware

c) Trojan

d) Adware

15.      By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

a) Trojan

b) Virus

c) Antivirus

d) Anti-malware

16.      Trojan creators do not look for _______________

a) Credit card information

b) Confidential data

c) Important documents

d) Securing systems with such programs

17.      Trojans do not do one of the following. What is that?

a) Deleting Data

b) Protecting Data

c) Modifying Data

d) Copying Data

18.      Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

a) virus, cyber-criminals

b) malware, penetration testers

c) trojans, cyber-criminals

d) virus, penetration testers

19.      Trojans can not ______________

a) steal data

b) self-replicate

c) steal financial information

d) steal login credentials

20.      A _______________ provides malicious users remote control over the targeted computer.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

21.      _______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

22.   ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader


23____________ work in background & keeps on downloading other malicious programs when the system is online.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

24.      A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

a) IM – Trojans

b) Backdoor Trojans

c) Trojan-Downloader

d) Ransom Trojan

25.      _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.

a) IM – Trojans

b) Backdoor Trojans

c) Trojan-Downloader

d) Ransom Trojan

26.      The ______________ can cost you money, by sending text messages from your mobile phone numbers.

a) IM – Trojans

b) Backdoor Trojans

c) SMS Trojan

d) Ransom Trojan

27.      A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.

a) front-door

b) backdoor

c) clickjacking

d) key-logging

28.      Backdoors cannot be designed as ______________

a) the hidden part of a program

b) as a part of Trojans

c) embedded code of the firmware

d) embedded with anti-malware

29.      Backdoors are also known as ______________

a) Malware-doors

b) Trojan-backups

c) Front-doors

d) Trapdoors

30.      Which of the following is a remote Trojan?

a) Troya

b) DaCryptic

c) BankerA

d) Game-Trojan



Answer: 






 

4 comments:

  1. This is excellent news for gaming authors and websites, as the more-n-more people are moving towards playing online games on net, the more excitement around the globe will be. IT management services Raleigh NC

    ReplyDelete
  2. Hello! I just would want to supply a huge thumbs up for your wonderful information you’ve got here for this post. I will be returning to your website to get more soon. managed security services Durham

    ReplyDelete
  3. This may be the proper weblog for anyone who wishes to be familiar with this topic. You are aware of a great deal its practically not easy to argue along (not too I actually would want…HaHa). You actually put a fresh spin with a topic thats been discussed for a long time. Fantastic stuff, just wonderful! managed security services Wilmington NC

    ReplyDelete