Q1. Which among the following correctly explains the
Cyber vandalism?
- Virtual defacement of someone else’s property
- Non-marital sexual services offered through the internet.
- An attempt to prevent users of a particular service from effectively using that service
- None of these
ANSWER-1
Q2. What is Smishing?
- Also k/a SMS phishing
- Similar to email phishing
- Typically invite the user to click a link, call a phone number, or contact an email address provided by the attacker via SMS message
- None of these
- All of these
ANSWER-5
Q3. What is spear phising?
- Use of telephony to conduct phishing attacks
- Involves an attacker directly targeting a specific organization or person with tailored phishing emails
- Termed bulk phishing
- Both B & C
ANSWER-2
Q4. Short cut key for Warm booting-
- CTRL + DELETE
- SHIFT+ DELETE
- ALT + DELETE
- CTRL + ALT + DELETE
ANSWER-4
Q5. How would you define Hacking?
- Unauthorized intrusion into computers
- Authorized intrusion into computers
- Used to breach computer software with malicious intent
- None of these
ANSWER-1
Q6. What is URL hijacking?
- Also Known as Typo-squatting
- An activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity
- Relies on mistakes such as typos made by Internet users when inputting a website address into a web browser
- Both A & C
ANSWER-4
Q7. Which among the following is not the example of
computer virus?
- Code Red
- Creeper
- Trojan viruses
- Elk Cloner
ANSWER-3
Q8. What is Cyber-extortion?
- A crime in which someone, via email, threatens to attack an individual, business, or organization if money is not provided to prevent the attack
- Malware computer program that replicates itself in order to spread to other computers
- Encompasses all the actions and processes that aim to attack a nation in order to cause harm that is comparable to the traditional warfare
- None of these
ANSWER-1
Q9. Cyber-terrorism involves?
- Act of misusing a computer system or network for a socially or politically motivated reason
- Fraudulent attempt to obtain sensitive information or data
- All of these
- The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
ANSWER-4
Q10. What is cold booting?
- To start up a computer that is turned off.
- Also called a hard boot.
- To start up a computer that is turned on.
- Both A & B
ANSWER-4
2 Comments
Ma'am could you please post the mcqs in pdf with answers
ReplyDeleteBig fan of your YouTube channel and blog
ReplyDelete