MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Information Security Class 11 MCQ Questions With Answers
1.
Which of the following would be considered an IoT device?
Tablet
Desktop PC
Video doorbell
Cell phone
2.
Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?
Integrity
Nonrepudiation
Defense in depth
Principle of least privilege
3.
Which of the following describes a type of malware that can only infect a computer after specific criteria have been met?
Time bomb
Logic bomb
Worm
Backdoor
4.
Which type of shredder is the best defense against dumpster diving?
strip-cut shredder
cross-cut shredder
micro-cut shredder
mini-cut shredder
5.
Specific conditions or configurations must exist before this malware is executed
Time Bomb
Logic Bomb
Worm
Rootkit
6.
Microsoft documents can be easily compromised by ____.
time bombs
ransomware
rootkits
macro viruses
7.
A(n) ____ exists in software when it was released and remains unknown until it is exploited by hackers.
adware
bug
zero-day vulnerability
weak app
8.
___ is malware that prevents legitimate access to data by encrypting the data content.
Drive-by-download
Polymorphic
Worm
Ransomware
9.
A computer that does not have any antimalware programs installed represents a ____ to data.
threat
vulnerability
payload
time bomb
10.
PCI DSS applies to which type of businesses?
Any business that accepts credit card transactions
Organizations that are publicly traded
Organizations that submit data through the Internet
Organizations that deal with financial information
11.
Security domain that addresses firewall settings and rules
WAN
LAN
Workstation
System
12.
Which of the following security domains represents the weakest link in the security chain?
Workstation
User
System
LAN
13.
Which of the following helps provide confidentiality to data?
A secure password
Encryption
Nonrepudiation
Antimalware
14.
Which of the following will provide the best search results for information on rootkits on Symantec’s website?
Allintitle:Symantec +rootkit
Site:Symantec.com “rootkit”
cache:rootkit +Symantec
Filetype:pdf “Symantec rootkit”
15.
Which is a true statement regarding adware?
Adware is always malware.
Adware is never malware.
Adware often results in pop-up advertisements.
Adware runs on a computer without the user’s consent.
16.
Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?
keylogger -hardware
Site:hardware keylogger
keylogger +hardware
keylogger -software +hardware
17.
Which security principle is violated by an attack in which users are unable to access their files?
Availability
Principle of least privilege
Integrity
Nonrepudiation
18.
A ____ cookie remains on your computer until the expiration date is reached.
session
persistent
third-party
super
19.
Type of malware that inserts snippets of code inside Microsoft Office type files.
Logic Bomb
Worm
Rootkit
Macro virus
Polymorphic virus
20.
Which element of the CIA triad deals with ensuring users only access files they need to do their job?
Authorization
Integrity
Availability
Confidentiality
21.
Which type of malware is designed to prevent anyone from reading the source code?
Rootkit
RAT
Armored virus
Ransomware
22.
Which of the following is a true statement?
Updated antimalware programs always find the latest threats on a system.
Opening e-mail attachments is a common attack vector for malware.
USB drives are no longer vulnerable to malware infection.
Heuristic analysis of systems can find only previously known viruses or threats.
23.
Which is the primary reason to use cookies?
To remember settings for users when returning to the site
To place malware on computers
To track every website a user opens
To provide clues to a user’s actions on their computer
24.
A virus that continuously changes its characteristics to avoid detection is called a(n) ____ virus.
armored
stealth
polymorphic
Trojan horse
25.
Malware type that is potentially very destructive, provides unlimited access to a computer from a remote location, and is very difficult to remove
Macro virus
Worm
Rootkit
Logic Bomb
Polymorphic virus
26.
A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file.
false positive
false negative
true positive
true negative
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page