MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Information Security Gate & PSU MCQ Questions With Answers
1.
A data subject is ...
the individual staff member who access and maintains the personal data
the person whose personal details are being stored by an organisation
2.
What does BIOS stand for?
It doesn't stand for anything
Basic Input Output System
Boots In One Second
Basically, I'm the Origin of the System
3.
Encryption is...
Organisational procedure to keep an electronic copy of important data (either on site or off site).
This is the process of encoding a message or information in such a way that only authorised parties can access it.
4.
If someone uses your personal information to sign up for a website without your agreement, this is called?
Cyberbullying
Identity Theft
A Prank
Phishing
5.
What does a virus do?
Makes the computer stop working
Attaches inside of program
Spreads across system
Gets full access
6.
Implementation of information security often described as combination of _.
art and science
art and math
ethics and math
ethics and physics
7.
Which of the following information isimportant in protecting client’s data?
Health insurance beneficiary numbers
Phone numbers
Zip codes
All of the above
8.
What is one way that you can preventidentity theft?
Maxing out your credit card
Throwing personal documents away withoutshredding them
Opening several accounts
Examining bank accountson a regular basis
9.
What is a worm?
A worm you see outside in the dirt.
A software used to worm into your computer.
Malware that can infect and spread without human assistance.
10.
Ransomware is an example of what type of security threat?
Internal
External
Physical
11.
Which of the following is referred to as the science of encryption?
Cryptography
Cryptanalysis
Cryptology
Cryptocism
12.
The _____ type of malware collects personal information and sends it to a third party.
Worm
Toolbar
Homepage hijacker
Spyware
13.
What is software?
Viruses on your computer
Programs used by a computer
Documents used to type information on
Harmful information
14.
What is spyware?
Malware that collects information about you without your consent or knowledge.
A program that looks through you laptop camera and allows your FBI Agent to see you.
A program that allows you to become a better spy and gives you tools to spy on your friends.
15.
What does 'integrity of data' mean?
"Accuracy and completeness of the data"
"Data should be viewable at all times"
"Data should be access by only the right people"
"None of the above"
16.
Which refers to a well-informed sense of assurance that the information risks and controls are in balance?
Arts
Security Artisan
Information Security
Architecture
17.
The _____ type of malware is code attached to another file. The malicious code automatically makes copies of itself and drops its payload when the host file is opened.
Virus
Worm
Keystroke logger
Toolbar
18.
What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-Logging
De-anonymization by network operators
Phishing attacks
19.
The system administrator in your office quits unexpectedly in the middle of the day. it's quickly apparent that he changed the server password and no one knows what is it. what might you do in this type of situation?
use a trojan horse to find the password
Use a password cracker to find the password
use social engineering to find the password
delete and reinstall the server
20.
What is a firewall?
A wall made of fire in your computer to make sure your computer is heated up and running properly.
A software used to attack other security measures in your computer to insure your computer is safe.
A filter that filters incoming data, protecting a network from attacks.
21.
What is Cyber security?
All the tools we use and actions we take to keep computers safe.
Protecting your computer against hackers
Being secure against cyber bots
22.
You receive a suspicious email that contains a link to a website. what should you do?
Inform IT about the email and do not open it
"Click on the link and open it to see where it goes"
"Go to the internet explorer and type the link"
"Forward it to a colleague and have them open it first"
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page