Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

G.

MADEGOWDA INSTITUTE OF
TECHNOLOGY
Bharathinagara (K.M.Doddi), Maddur Taluk, Mandya Dist. – 571422
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

SUBJECT NAME: INTRODUCTION TO CYBER SECURITY


(21CS653)

IA QUIZ Sem VI sem (CSE)


SUSHEELA Instructions:
Faculty N Date
Answer all the
Max. questions
20 Time
Marks

1.Which of the following is considered an element of cyber security


a) Network Security
b) Operational security
c) Application security
d) All of the above
2.Malware stands for
a) Multipurpose software
b) Malfunctioned software
c) Malicious software
d) Malfunctioning software
3.To what does a DNS translate a domain name
a) HEX
b) IP
c) Binary
d) URL
4.Identify the type of attack which uses a fraudulent server with a relay address
a) MITM
b) NTLM
c) SMB
d) NetBIOS
5.Which of the following is used for monitoring traffic and analysing network flow?
a) Managed detection and response
b) Cloud access security broker
c) Network traffic analysis
G. MADEGOWDA INSTITUTE OF
TECHNOLOGY
Bharathinagara (K.M.Doddi), Maddur Taluk, Mandya Dist. – 571422
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

d) Network security firewall


6.which of the following is considered as the unsolicited commercial email?
a) Virus
b) spam
c) malware
d) all of the above
7.Which of the following tool is used in wi-fi hacking
a) Aircrack-ng
b) Wireshark
c) Norton
d) none
8.Which of the following can be considered as the class of computer threats?
a) DoS Attack
b) phishing
c) soliciting
d) Both B and C
9.Which protocol is mostly used in Wi-Fi security
a) WPS
b) WPA
c) WPA2
d) both B and C
10.Which software is mainly used to help users detect viruses and avoid them
a) Antivirus
b) Adware
c) Malware
d) None of the above
11.What is code-red
a) Virus
b) Antivirus
c) word-processing software
d) photo editing software
12.Why is proxy server is used by a hacker
G. MADEGOWDA INSTITUTE OF
TECHNOLOGY
Bharathinagara (K.M.Doddi), Maddur Taluk, Mandya Dist. – 571422
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

a) For obtaining remote access connection


b) Hiding malicious activity on the network
c) Create a stronger connection with the target
d) Create a ghost server on the network
13.Choose the default port number for Apache and other webserver
a) 20
b) 27
c) 80
d) 87
14.Choose the features which violate cyber security
a) Exploit
b) Attack
c) Compliance
d) none
15.EDR Stands for
a) Endless detection and response
b) Endpoint detection and response
c) Endless detection and recovery
d) Endpoint detection and recovery
16.Identify the first computer virus among the following
a) Blaster
b) Creeper
c) Sasser
d) B and C
17.Identify the legal form of hacking
a) Cracking
b) Non-ethical Hacking
c) Ethical hacking
d) Hacktivism
18.Identify the oldest phone hacking technique used by hacker to make free calls
a) Spamming
b) Phreaking
G. MADEGOWDA INSTITUTE OF
TECHNOLOGY
Bharathinagara (K.M.Doddi), Maddur Taluk, Mandya Dist. – 571422
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

c) cracking
d) Phishing
19.Identify he private search engine
a) Bing
b) Google
c) DuckDuckGo
d) Yahoo
20.Identify the term which denotes the protection of data from modification by
unknown users
a) Confidentiality
b) Authentication
c) Integrity
d) Non-Repudication

You might also like