Modal 1 MCQ of CYBER SECURITY
Modal 1 MCQ of CYBER SECURITY
Modal 1 MCQ of CYBER SECURITY
1. What is Cyberspace?
a. A physical computer network
b. A virtual space for online communication
c. A type of computer virus
d. An offline storage system
Answer: b. A virtual space for online communication
4. What are the fundamental building blocks of the Internet during the Innovation Phase?
a. Web browsers
b. Packet-switching hardware, TCP/IP, client/server computing
c. Cloud services
d. DNS and HTTP protocols
Answer: b. Packet-switching hardware, TCP/IP, client/server computing
10. What is the official birthday of the Internet, marking the establishment of the TCP/IP
protocol?
a. January 1, 1980
b. January 1, 1983
c. July 4, 1976
d. March 12, 1990
Answer: B) January 1, 1983
11. Which of the following is a web-based cyber-attack that attempts to steal sensitive
information by masquerading as a trustworthy entity?
a. Worm
b. Phishing
c. Trojan Horse
d. Denial of Service
Answer: B) Phishing
12. What is the term for a self-replicating malicious program that spreads throughout
computer files?
a. Worm
b. Trojan Horse
c. Virus
d. Phishing
Answer: C) Virus
13. Which technology involves creating and maintaining websites and web applications?
a. Cloud Computing
b. Web Development
c. Mobile Web
d. Networking
Answer: B) Web Development
14. Which organization oversees domain name system management and policy?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. Internet Corporation for Assigned Names and Numbers (ICANN)
d. World Wide Web Consortium (W3C)
Answer: c. Internet Corporation for Assigned Names and Numbers (ICANN)
17. What does the World Wide Web (WWW) consist of?
a. A collection of servers
b. A global system of interconnected documents and resources
c. A type of computer virus
d. A hardware component of the internet
Answer: b. A global system of interconnected documents and resources
19. What is the primary responsibility of the Internet Architecture Board (IAB)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: c. Adjudicate on disputes about standards
20. Which attack aims to make a server or network resource unavailable to users?
a. Injection attack
b. Denial of Service (DoS) attack
c. Phishing attack
d. Worm attack
Answer: b. Denial of Service (DoS) attack
21. What is the primary purpose of the Internet Engineering Task Force (IETF)?
a. Develop technical standards for the Internet
b. Manage domain names
c. Adjudicate on disputes about standards
d. Enforce cyber laws
Answer: a. Develop technical standards for the Internet
22. What technology is responsible for translating domain names into IP addresses?
a. HTTP
b. FTP
c. DNS
d. TLS
Answer: c. DNS
24. What type of attack involves masquerading as a trustworthy entity to steal sensitive
information?
a. Injection attack
b. Phishing attack
c. Session Hijacking
d. Denial of Service (DoS) attack
Answer: b. Phishing attack
25. What phase of the Internet's history is characterized by the conceptualization and
implementation of fundamental building blocks?
a. Innovation Phase
b. Institutionalization Phase
c. Commercialization Phase
d. Development Phase
Answer: a. Innovation Phase
26. What technology enables the seamless user experience on smartphones and tablets?
a. Web development
b. Mobile web technology
c. Cloud computing
d. Quality of Service (QoS)
Answer: b. Mobile web technology
27. What ensures that systems and data are accurate and trustworthy in cybersecurity?
a. Availability
b. Authentication
c. Integrity
d. Confidentiality
Answer: c. Integrity
28. Which organization promotes the use and future development of the internet?
a. Internet Society (ISOC)
b. Internet Engineering Task Force (IETF)
c. World Wide Web Consortium (W3C)
d. Internet Corporation for Assigned Names and Numbers (ICANN)
Answer: a. Internet Society (ISOC)
33. What technology is used to optimize data delivery by caching content at various
locations worldwide?
a. CDN (Content Delivery Network)
b. VPN (Virtual Private Network)
c. DNS (Domain Name System)
d. HTTP (Hypertext Transfer Protocol)
Answer: a. CDN (Content Delivery Network)
34. What is the primary goal of the Innovation Phase of the Internet's history?
a. Commercialization
b. Conceptualization of fundamental building blocks
c. Development of hardware components
d. High-speed data transfer
Answer: b. Conceptualization of fundamental building blocks
35. What does the lack of formal framework in cyberspace result in?
a. Strong regulation
c. Centralized control
d. Limited freedom
44. What is the primary focus of the Institutionalization Phase in the history of the
Internet?
a. Commercialization
b. Conceptualizing and implementing fundamental building blocks
c. Providing funding and legitimization
d. Regulation
Answer: c) Providing funding and legitimization
49. What is the role of web browsers like Google Chrome and Mozilla Firefox?
a. Store data
b. Create websites
c. Access and interact with web content
d. Manage hardware resources
Answer: C) Access and interact with web content
50. Which protocol is responsible for the actual delivery of packets in TCP/IP?
a. TCP
b. IP
c. HTTP
d. DNS
Answer: b. IP