Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Modal 1 MCQ of CYBER SECURITY

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Modal MCQ on Introduction to Cyber security

1. What is Cyberspace?
a. A physical computer network
b. A virtual space for online communication
c. A type of computer virus
d. An offline storage system
Answer: b. A virtual space for online communication

2. Who coined the term "Cyberspace" and in which year?


a. Tim Berners-Lee, 1989
b. William Gibson, 1984
c. Mark Zuckerberg, 2004
d. Al Gore, 1997
Answer: b. William Gibson, 1984

3. What is the primary purpose of creating Cyberspace?


a. Gaming
b. E-commerce
c. Entertainment
d. Sharing information and global communication
Answer: d. Sharing information and global communication

4. What are the fundamental building blocks of the Internet during the Innovation Phase?
a. Web browsers
b. Packet-switching hardware, TCP/IP, client/server computing
c. Cloud services
d. DNS and HTTP protocols
Answer: b. Packet-switching hardware, TCP/IP, client/server computing

5. Who is credited with inventing the World Wide Web in 1989?


a. Bill Gates
b. Steve Jobs
c. Tim Berners-Lee
d. Larry Page
Answer: C) Tim Berners-Lee
6. What does the term "Internet of Things (IoT)" refer to in Cyberspace?
a. Internet browsers
b. Connected devices exchanging data
c. Social media platforms
d. Cloud computing services
Answer: B) Connected devices exchanging data

7. What does DNS stand for in the context of Cyberspace?


a. Dynamic Network System
b. Domain Name System
c. Data Network Security
d. Digital Naming Service
Answer: B) Domain Name System

8. What does TCP/IP stand for in the context of Internet communication?


a. Total Control Protocol/Internet Protocol
b. Transmission Control Protocol/Internet Protocol
c. Technical Control Protocol/Internet Process
d. Transferable Communication Protocol/Internet Process
Answer: B) Transmission Control Protocol/Internet Protocol

9.What organization establishes web standards to ensure compatibility and accessibility


across different devices and browsers?
a. W3C (World Wide Web Consortium)
b. IEEE (Institute of Electrical and Electronics Engineers)
c. ISO (International Organization for Standardization)
d. IETF (Internet Engineering Task Force)
Answer: A) W3C (World Wide Web Consortium)

10. What is the official birthday of the Internet, marking the establishment of the TCP/IP
protocol?
a. January 1, 1980
b. January 1, 1983
c. July 4, 1976
d. March 12, 1990
Answer: B) January 1, 1983
11. Which of the following is a web-based cyber-attack that attempts to steal sensitive
information by masquerading as a trustworthy entity?
a. Worm
b. Phishing
c. Trojan Horse
d. Denial of Service
Answer: B) Phishing

12. What is the term for a self-replicating malicious program that spreads throughout
computer files?
a. Worm
b. Trojan Horse
c. Virus
d. Phishing
Answer: C) Virus

13. Which technology involves creating and maintaining websites and web applications?
a. Cloud Computing
b. Web Development
c. Mobile Web
d. Networking
Answer: B) Web Development

14. Which organization oversees domain name system management and policy?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. Internet Corporation for Assigned Names and Numbers (ICANN)
d. World Wide Web Consortium (W3C)
Answer: c. Internet Corporation for Assigned Names and Numbers (ICANN)

15. What is the primary goal of Cybersecurity?


a. Ensuring data accuracy
b. Preventing unauthorized access and protecting systems
c. Maximizing processing power
d. Facilitating data sharing
Answer: b. Preventing unauthorized access and protecting systems
16. Which protocol is fundamental to internet communication and allows data packets to
be routed across the network?
a. HTTP
b. FTP
c. TCP/IP
d. SMTP
Answer: c. TCP/IP

17. What does the World Wide Web (WWW) consist of?
a. A collection of servers
b. A global system of interconnected documents and resources
c. A type of computer virus
d. A hardware component of the internet
Answer: b. A global system of interconnected documents and resources

18. What phase of the Internet's history is characterized by commercialization?


a. Innovation Phase
b. Institutionalization Phase
c. Commercialization Phase
d. Development Phase
Answer: c. Commercialization Phase

19. What is the primary responsibility of the Internet Architecture Board (IAB)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: c. Adjudicate on disputes about standards

20. Which attack aims to make a server or network resource unavailable to users?
a. Injection attack
b. Denial of Service (DoS) attack
c. Phishing attack
d. Worm attack
Answer: b. Denial of Service (DoS) attack
21. What is the primary purpose of the Internet Engineering Task Force (IETF)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: a. Develop technical standards for the Internet

22. What technology is responsible for translating domain names into IP addresses?
a. HTTP
b. FTP
c. DNS
d. TLS
Answer: c. DNS

23. What is the primary goal of a Trojan horse?


a. Spread to uninfected computers
b. Steal sensitive information
c. Manipulate computer settings
d. Replicate itself
Answer: c. Manipulate computer settings

24. What type of attack involves masquerading as a trustworthy entity to steal sensitive
information?
a. Injection attack
b. Phishing attack
c. Session Hijacking
d. Denial of Service (DoS) attack
Answer: b. Phishing attack

25. What phase of the Internet's history is characterized by the conceptualization and
implementation of fundamental building blocks?
a. Innovation Phase
b. Institutionalization Phase
c. Commercialization Phase
d. Development Phase
Answer: a. Innovation Phase
26. What technology enables the seamless user experience on smartphones and tablets?
a. Web development
b. Mobile web technology
c. Cloud computing
d. Quality of Service (QoS)
Answer: b. Mobile web technology

27. What ensures that systems and data are accurate and trustworthy in cybersecurity?
a. Availability
b. Authentication
c. Integrity
d. Confidentiality
Answer: c. Integrity

28. Which organization promotes the use and future development of the internet?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. World Wide Web Consortium (W3C)
d. Internet Corporation for Assigned Names and Numbers (ICANN)
Answer: a. Internet Society (ISOC)

29. What does SSL/TLS encryption primarily contribute to in internet infrastructure?


a. Data privacy
b. Network infrastructure
c. DNS functionality
d. Cloud services
Answer: a. Data privacy

30. What is the purpose of an Injection attack?


a. Encryption of data
b. Manipulation of the application to fetch information
c. Stealing sensitive information
d. Making a server unavailable
Answer: b. Manipulation of the application to fetch information
31. What is the primary responsibility of the Internet Engineering Steering Group (IESG)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Review standards proposed by the IETF
d. Enforce cyber laws
Answer: c. Review standards proposed by the IETF

32. What characterizes the Institutionalization Phase of the Internet's history?


a. Conceptualization of fundamental building blocks
b. Commercialization of the Internet
c. Development of hardware components
d. Funding and legitimization by large institutions
Answer: d. Funding and legitimization by large institutions

33. What technology is used to optimize data delivery by caching content at various
locations worldwide?
a. CDN (Content Delivery Network)
b. VPN (Virtual Private Network)
c. DNS (Domain Name System)
d. HTTP (Hypertext Transfer Protocol)
Answer: a. CDN (Content Delivery Network)

34. What is the primary goal of the Innovation Phase of the Internet's history?
a. Commercialization
b. Conceptualization of fundamental building blocks
c. Development of hardware components
d. High-speed data transfer
Answer: b. Conceptualization of fundamental building blocks

35. What does the lack of formal framework in cyberspace result in?
a. Strong regulation

b. Anonymity (nobody's domain)

c. Centralized control
d. Limited freedom

Answer: b. Anonymity (nobody's domain)


36. What is the primary challenge in extending traditional laws to cyberspace?
a. Multiple Jurisdictions
b. Lack of technical knowledge
c. Expensive process
d. Obtaining digital evidence
Answer: a. Multiple Jurisdictions

37. What What does URL stand for?


a. Universal Resource Locator
b. Unified Resource Locator
c. Uniform Resource Locator
d. Ultimate Resource Locator
Answer: c. Uniform Resource Locator

38. What does the term "governance" in cyberspace refer to?


a. Development of software
b. Policies, regulations, and oversight
c. Web design
d. Internet infrastructure management
Answer: b. Policies, regulations, and oversight

39. What does the term "WWW" stand for?


a. World Web Wonders
b. Wide World of Web
c. World Wide Web
d. Web World Wide
Answer: c. World Wide Web

40. What does the term "HTML" stand for?


a. HyperText Markup Language
b. Hypnotic Text Manipulation Language
c. High-Tech Multimedia Language
d. Hyperlink and Text Management Language
Answer: a. HyperText Markup Language

41. What are the building blocks of a computer's hardware?


a. RAM, SSD, CPU
b. CPU, GPU, PSU
c. CPU, RAM, Storage (HDD/SSD), Input/Output devices
d. GPU, SSD, Monitor
Answer: c) CPU, RAM, Storage (HDD/SSD), Input/Output devices
42. What does QoS stand for in the context of internet infrastructure?
a. Quality of Security
b. Quality of Service
c. Quantity of Servers
d. Quantum of Speed
Answer: b) Quality of Service

43. What is the primary goal of data encryption in cybersecurity?


a. Making data accessible when needed
b. Preventing unauthorized access or disclosure of sensitive information
c. Replicating malicious code
d. Verifying the identity of users
Answer: b) Preventing unauthorized access or disclosure of sensitive information

44. What is the primary focus of the Institutionalization Phase in the history of the
Internet?
a. Commercialization
b. Conceptualizing and implementing fundamental building blocks
c. Providing funding and legitimization
d. Regulation
Answer: c) Providing funding and legitimization

45. What is the primary challenge posed by insider threats in cybersecurity?


a. High internet speed
b. Lack of resources
c. Difficulty in detection and prevention
d. Abundance of technical knowledge
Answer: c) Difficulty in detection and prevention

46. Which component translates human-readable domain names into IP addresses in


Cyberspace?
a. HTTP
b. DNS
c. TCP
d. IP
Answer: b. DNS
47. Which protocol is used for secure data transfer over the web?
a. HTTP
b. FTP
c. HTTPS
d. TCP
Answer: c. HTTPS

48. What does ARPANET stand for?


a. Advanced Research Projects Agency Network
b. American Research Project for Advanced Networking
c. Association of Research Professionals and Networking
d. Automated Research Program for Advanced Network Technologies
Answer: a. Advanced Research Projects Agency Network

49. What is the role of web browsers like Google Chrome and Mozilla Firefox?
a. Store data
b. Create websites
c. Access and interact with web content
d. Manage hardware resources
Answer: C) Access and interact with web content

50. Which protocol is responsible for the actual delivery of packets in TCP/IP?
a. TCP
b. IP
c. HTTP
d. DNS
Answer: b. IP

You might also like