Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Module 2.

2
CYBER SECURITY
1. Unsolicited email sent in bulk is
A. threat B. virus C. spam D. phishing
2. Email threats sensitive information from systems
A. spam B. virus C. phishing D. trojen
3. Malware comprises of
A. malicious software B. viruses C. worms & trojens D. all of above
4. Data theats caused by natural causes
A. malware B. email C. earthquake D. spam
5. Major data threat from system is by
A. virus B. hackers C. insiders D. all of above
6. Defense system against malware attack is
A. security disk B. firewall C. system restore D. remote backup
7. Any potential danger to information is
A. exploit B. Insider C. Threat D. risk
8. What is called Protecting data from online attacks, deletions, malware?
A. physical security B. cyber security C. hyper security D. reliable security
9. Script files sent mostly through email attachment to attack host computer are called as
A. Worms B. Phishing attacks C. Trojans D. Computer Viruses
10. Attacking the victims through fake URL resembling that of a valid financial institution is called as
A. Worms B. Phishing attacks C. Trojans D. Computer Viruses
11. Getting the user ID and password from a victim through dubious program is called
A. Worms B. Phishing attacks C. Trojans D. Computer viruses
12. A malicious program spreading through Internet and storage media and attacking the data in victims
computer is called
A. Worms B. Phishing attacks C. Trojans D. Computer viruses
13. Under information security, CIA stands for
A. Criminal Investigation Agency B. Confidentiality, Integrity, Availability
C. Cost Information Agency D. Credit Integrity Assessment
14. What is called the practice of protecting data from unauthorized access?
A. physical security B. Link security C. risk management D. information security
15. Potential weaknesses in IT infrastructure through which a cyber attack might occuris called
A. strength B. antivirus C. vulnerability D. port
16. The person using vulnerability in operating system or application software or IT infrastructure to
intrude in to the computer of a victim is called
A. Hacker B. Cracker C. Maker D. Tracker
17. What is called Periodic assessment of security vulnerability in computer systems?
A. threat B. attack C. hacking D. security audit
18. What is called maintaining computers free from cyber attack is called
A. cyber attack B. risk management C. online fraud D. phishing
19. A single point of access for several networking services is called
A. Directory Service B. Webserver C. email server D. Windows Server
20. Directory service permits security administrators to
A. concentrate on security of directory service instead of individual machines
B. create new vulnerabilities C. damage the security of computers
D. create new virus
21. LDAP in directory service stands for
A. Light Weight Directory Access Provider B. Light Weight Directory Access Protocol
C. Light Weight Directory Access Program D. Light Weight Directory Access Protection
22. Which activities endanger the sovereignty and integrity of the nation?
A. Cyber vandalism B. Cyber Squatting C. Cyber Terrorism D. Carding
23. Protecting the data divulged by customers from unauthorized access is called
A. privacy protection B. audit C. antivirus D. vulnerability
24. Information on criminal records of individuals, financial data of companies, genetic information,
address, mobile number, email ID, record of web surfing behavior, record of credit card, record of
debit card, net banking details, etc. are classified under...
A. privacy protection B. audit C. antivirus D. vulnerability

You might also like