MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Information Security Class 12 MCQ Questions With Answers
1.
A cookie that remains until an expiration date is met is:
session cookie
secure cookie
persistent cookie
super cookie
2.
All of the following are business security domains except:
hackers
users
WAN
system
3.
How does a zero-day vulnerability differ from malware?
they are the same type of threat
it is a flaw in software when it was released, not an infection
it can be passed from one computer to another, where malware cannot
it is not a security concern, where malware is a concern
4.
Which security principles are covered by the CIA triad?
certified, integrated, accessible
continuity, integrity, accessibility
confidentiality, integrity, availability
confidentiality, installation, assembly
5.
A sales rep has edited the electronic rota to give herself an extra 3 weeks off in the summer
Restrict access on the computer systems
Restrict physical access around the office
Tell staff to stay away from the HR file on the system
Make use of a firewall
6.
How does a rootkit virus work?
provides a secret or unknown access point into a system
deploys its payload when a date or time occurs
infects a computer before the operating system loads
hides inside other software that appears to be harmless
7.
A virus has infected your computer system, employee records cannot be opened
Back up information regularly (on site or off site)
Keep a bundle of paper employee details on your desk
Restrict physical access around the office
Re-enter all employee data into the system when this happens
8.
What does compliance mean?
providing secure access to user data
using honest means to bypass security measures
conducting tests to identify vulnerabilities in a system
following the rules or standards that have been established
9.
Your on site back up drives have been stolen from the file room
Restrict access on computer systems
Restrict physical access around the office
Hide the back ups in different drawers every week
Ask employees to stay out of the file room
10.
Which law prevents company executives from hiding or destroying electronic records?
SOX
ECPA
GLBA
CFAA
11.
A virus has been downloaded by an employee
Restrict physical access around the office
Use a firewall
Install an anti-virus
Ask employees to stay away from risky websites
12.
A new member of staff has deleted some of the template invoices on the system
Make all master copies 'read only'
Give new members of staff a long list of files that they shouldn't access
Use encryption
Install an anti-virus
13.
What does a keylogger do?
provides
prevents certain data from being entered
encrypts data entered with a keyboard
tracks a user's keystrokes on the keyboard
14.
Which of the following is not considered social engineering?
dumpster diving
convincing people to reveal information
encrypting data to prevent user access until a fee is paid
looking through social media sites for information
15.
There has been a fire in your office building, all computers have been damaged
Phone the technician
Use on site back up
Keep paper copies of customer information
Use off site back up
16.
Which malware does not steal or destroy data, rather prevents user access to it until a fee is paid?
armored virus
time or logic bomb
ransomware
Trojan horse
17.
One of your business laptops containing private customer information has been left on a train
Use a firewall
Tell employees to use pen drives instead of taking laptops home
Encrypt business laptops
Install an anti-virus
18.
A hacker has stolen all of your customer information
Install an anti-virus
Keep all customer data on paper
Use a firewall
Restrict physical access around the office
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page