MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Ethical Hacking Class 9 MCQ Questions With Answers
1.
The main advantage of asymmetric cryptography is that it offers better security because it uses two different keys.
True
False
2.
Which of the following refers to someone who has a conviction?
Someone who has committed a crime
Someone who witnessed a crime
Someone who has been found guilty of a crime
Someone who is caught in the act of committing a crime
3.
The "A" in the CIA triad stands for
Accessibility
Advantage
Availability
Both A & B
4.
What type of things can be classed as computer misuse?
Looking at personal emails during work time
Sending a joke on the work email to everyone in the system
Using another member of staffs PC when they have left it unlocked
Using a work computer to buy personal items
5.
What does GDPR stand for?
Great Danes Performance Ratings
General Data Protection Records
General Disclosure Protection Regulations
General Data Protection Regulation
6.
Hackers who engage in hacking for illegal purposes are known as which of the following?
Red hat hacker
Black hat hacker
Blue hat hacker
White hat hacker
7.
Having a password that consists of a combination of letters, both uppercase and lowercase, numbers and symbols is known as which of the following?
Secure password
Solid password
Keylogger password
Trojan password
8.
Plaintext + key = ______________.
Decoded
Ciphertext
Uncoded
9.
This is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
Encryption
Conscription
Decryption
All of above
10.
Which one of the following laws extends police powers and grants the home office greater control over operational policing?
Police and Justice Act
Police and Home Office Act
Data Protection Act
Data Police Investigation Act
11.
The "C" in the CIA triad stands for
Communications
Compatibility
Confidentiality
None of these
12.
____________, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's computer security system.
Enigma
Error Testing
Ethical Hacking
None of these
13.
A group, or string, of random characters in a particular order, used to scramble data to make it private or gibberish to outsiders.
Key
Lock
Anchor
All of above
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page