MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
Computer Science
Cyber Security
Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Report Question
0%
Malicious Code
0%
Computer Worm
0%
Anti Virus Software
0%
Computer Virus
type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
Report Question
0%
Computer Virus
0%
Computer Worm
0%
MyDoom
0%
Malicious Code
How does malware get onto your computer?
Report Question
0%
Email attachments or links
0%
By visiting dodgy websites
0%
On USB sticks
0%
All of the above
Malware is made to stop your device from running properly and sometimes to steal your information.
Report Question
0%
True
0%
False
Which is NOT a type of malware?
Report Question
0%
Virus
0%
Worm
0%
Trojan horse
0%
Sandwich
Which of the following best describes a Trojan Horse
Report Question
0%
Malicious software that misleads users of its intent, which is to allow unauthorised access to your system
0%
Malicious software that replicates itself and spreads through your network to steal data
0%
Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system
0%
Malicious software that sets your computer on fire
When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?
Report Question
0%
A link to open another site
0%
A webpage that has a secure connection
0%
A program that prevents you from leaving the page
0%
A warning that you are not allowed to view this webpage
Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources
Report Question
0%
spyware
0%
worms
0%
trojans
0%
phishing
An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as:
Report Question
0%
Cookie
0%
Widgets
0%
script
0%
logs
When do you need to use AntiVirus software?
Report Question
0%
When you first get your computer.
0%
All the time, on your laptop only -and make sure it is updated!
0%
All the time, on ALL digital devices -and make sure it is updated!
0%
As soon as you start to feel sick.
What should you do if you think you have been hacked?
Report Question
0%
Report the problem to the company.
0%
Change your password.
0%
Tell your parents or a trusted adult.
0%
All of the above.
What is Spam?
Report Question
0%
Canned meat.
0%
Unsolicited emails sent to many email addresses that try to get you buy something or share private information.
0%
A computer virus that will hack your account.
To keep your browser private, you can use the _______ mode.
Report Question
0%
incognito
0%
confidential
0%
encrypted
0%
deception
Which of these is an example of a phishing email?
Report Question
0%
You have won the lottery! Follow this link to claim.
0%
Your bank account has been hacked. Login in here to protect yourself.
0%
Help! I am stuck in Europe and I need money to travel home.
0%
All of the above!
Which of these is an indicator that the website is secure.
Report Question
0%
Bruce Lee photo
0%
The http://
0%
The https://
0%
The https:\\
What is the term for computer programs that can wreak havoc on your device?
Report Question
0%
Dangerbots
0%
Problemware
0%
Malware
0%
Hyperlinks
What is spyware??
Report Question
0%
When your kids use your phone
0%
James Bond's movie
0%
Software that collects data from computer
0%
a cyber criminal
What is phishing??
Report Question
0%
Wrong spelling of fishing
0%
When criminals try to act like trustworthy sources and try to steal info
0%
Criminal who goes to lake to find data
0%
A type of computer virus
Which of the following is a phishing email??
Report Question
0%
You have won a lottery!! Follow this link to claim it!!
0%
Your bank account has been compromised. Login here to protect yourself.
0%
Help.I am stuck aboard and urgently need money transferred to me to get home.
0%
All of the above. Be careful.
When do you need to use anti-virus software.
Report Question
0%
When you are sick.
0%
When you are a doctor and give appointments
0%
When you buy your first computer
0%
All the time, in all devices and wireless connections to protect your devices.
Which of these were not the most common passwords of 2015
Report Question
0%
hello
0%
1234
0%
Password
0%
qwerty
What is the best password policy?
Report Question
0%
Always write the same passwords in every link
0%
Your name, personal details
0%
Have random password which you can't remember
0%
Never use remember password and keep complex passwords you can remember
Which of these is the most secure wifi username?
Report Question
0%
HiWiFi
0%
HelloWiFi
0%
WiFi
0%
Doesn't matter
What can we use to protect our computer from hackers
Report Question
0%
fire wall
0%
a picture which says "stay away"
0%
Using a non approved VPN
0%
all of the above
What is Ransomware
Report Question
0%
A Disease you get from playing to much Fortnite
0%
A type of malware that wants Money
0%
An Anti Virus Software
0%
Software that protects you from Phishing
An Antivirus protects you from all attacks
Report Question
0%
True
0%
False
Who should know your passwords?
Report Question
0%
Only you!
0%
Your best friends
0%
Anyone
What is the term for computer programs that attack your computer?
Report Question
0%
Malware
0%
DangerDroids
0%
RudeBots
0%
Dangerware
What does the "https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
Report Question
0%
That the site has special high definition
0%
That information entered into the site is encrypted and secured
0%
That the site is the newest version available
0%
That the site is not accessible to certain computers
Which of the following four passwords is the most secure?
Report Question
0%
Boat123
0%
WTh!5Z
0%
123456
0%
Not sure
What is AntiVirus software?
Report Question
0%
Software that blocks all unwanted ads.
0%
Software that keeps you from getting sick.
0%
Software that protects your device from viruses and malware.
Which of these indicates a website is secure?
Report Question
0%
You found the website on Google or clicked it from a link in an email.
0%
A little lock icon next to the website address.
0%
The website shows a company name and logo and looks real.
Which of the following are the cyber tips one must follow?
Report Question
0%
Keep a close eye on your mobile device
0%
Keep It Locked
0%
Know Your Apps
0%
Only Connect to the Internet if Needed
0%
All of the above
It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
Report Question
0%
Antivirus
0%
Firewall
0%
Cookies
0%
Malware
Which of the following refers to the violation of the principle if a computer is no more accessible?
Report Question
0%
Access control
0%
Access control
0%
Availability
0%
Integrity
In the CIA Triad, which one of the following is not involved?
Report Question
0%
Availability
0%
Confidentiality
0%
Authenticity
0%
Integrity
Which of the following is not the role in cyber security?
Report Question
0%
Security Management
0%
Standing Committee
0%
Executive Committee
0%
Cybersecurity Practitioners
Which approach is used to implements security with no particulars aspects or criteria.
Report Question
0%
Compliance based security
0%
Risk-based security
0%
Adhoc approach
0%
Risk-Free approach
Which of the password is more secure and strong.?
Report Question
0%
Abc123
0%
Password123
0%
@dm1n#32!
0%
Admin
Which is best practice to remember your password.?
Report Question
0%
Stick the password on monitor screen
0%
Paste password on keyboard
0%
Write it down in your personal notebook
0%
Share with your friend
What is mouse of your computer start clicking things on desktop and move around its own.?
Report Question
0%
Unplug the mouse
0%
Turn off the computer
0%
Run Anti-Virus program
0%
Disconnect the internet connection immediately
If your friend asks you to share your password to use your computer for work, what should you do?
Report Question
0%
Being your friend, you share the password
0%
You decline to provide
0%
You login yourself and allow him to work
0%
You create his login on your computer
What are the different types of Malwares name.? Choose all applicable
Report Question
0%
Viruses
0%
Trojan
0%
Spywares
0%
Worms
0%
All of the above
Is it safe to download anything from website or content provider whom you don’t trust.?
Report Question
0%
Yes, I will download
0%
No,I will not download
You get a new email saying you Won Rs. 1,00,000 lottery in your inbox, would you open it.?
Report Question
0%
Open and read the email
0%
No, I ignore email & delete from inbox
0%
I'll keep it for future action
Updating Window patches & Anti-Virus regularly of your computer preventing your computer from any virus attacks and hacking.?
Report Question
0%
True
0%
False
Using public WI-FI (Such as Malls/Parks/Airport) is safe to use for sensitive activity such as online banking or making payments using your Debit/Credit cards.?
Report Question
0%
True
0%
False
Turning off the GPS functions on your smartphone prevents any tracking of your phone’s location.?
Report Question
0%
True
0%
False
What is Cyber Security?
Report Question
0%
Refers to when security bring viruses to our computer by spying
0%
Refers to the computer when security protects the computer for viruses such as Malware, Spyware ,worm etc.
0%
Refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
0%
Refers the state of being free from danger or threat
What is the most common age for people who start committing into cyber crime?
Report Question
0%
15-20
0%
21-25
0%
26-30
0%
30+
Which of these isn't a cyber crime?
Report Question
0%
Accessing unauthorized data/ using someone's computer without permission
0%
Tricking people into downloading malware
0%
Accessing the DarkWeb
0%
Creating an account on something you're not old enough for
Programs that look useful, but cause damage to your computer
Report Question
0%
Phishing
0%
Spyware
0%
Worms
0%
Trojans
Why should you be careful about what you open and download on the internet?
Report Question
0%
It could be something inappropriate.
0%
It could have a virus that harms your computer.
0%
It could steal information from your computer.
0%
All of the above.
What is the term for computer programs that can wreak havoc on your device?
Report Question
0%
Virus
0%
Software
0%
Computer
0%
Digita;
Can anyone tell me what they think spyware is?
Report Question
0%
When someone uses your phone
0%
A spy movie
0%
A criminal
0%
Software that collects data from your device
What is Phishing?
Report Question
0%
The wrong spelling of the word fishing
0%
A criminal who goes on a boat to find data in the sea
0%
When someone acts like a trustworthy source to steal your information.
0%
A bug that can get into your home
Which one of these is an example of a phishing email?
Report Question
0%
You won a new phone, click here to claim it.
0%
You have a rich family member who wants to share their money. Click here to get yours.
0%
Help I am stuck in a foreign country and I need some money to get back home.
0%
All of the above
What software can we use to protect our device from hackers?
Report Question
0%
Fortnite
0%
Firewall
0%
Microsoft Office
0%
Google Chrome
What is Anti-Virus Software?
Report Question
0%
Software that protects you from all animals
0%
Software that protects your device
0%
Software that tells you when its time to rest so you don not get sick
0%
Software that protects your roof
When should you get Anti-Virus Software.
Report Question
0%
When you are sick
0%
If you are a doctor helping someone who is sick
0%
When you get a new device
0%
When it is time for you to rest
What is a policy that requires users to change passwords periodically?
Report Question
0%
password expiration
0%
password encryption
0%
password complexity
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
Report Question
0%
Converting
0%
Hacking
0%
Phishing
Unsolicited electronic messages, especially advertising is know as?
Report Question
0%
Spim
0%
Spam
0%
Ransomware
Which of these is not a form of phishing
Report Question
0%
fake email
0%
fake website link
0%
spam
0%
key logger
Which of these is NOT a good password?
Report Question
0%
#LooneyToons23
0%
Ilovecats!95
0%
password
0%
#Iasw,aA!
Small files that Websites put on your computer hard disk drive when you first visit
Report Question
0%
Hardware
0%
Cookies
0%
Chips
0%
Instant Files
What is Malware?
Report Question
0%
Software that protects your computer from viruses
0%
Software that protects your computer from spyware and adware infections
0%
Software that updates your computers operating system
0%
Software that may harm your computer
If you receive an attachment from someone you don't know, you should never open it.
Report Question
0%
True
0%
False
The _____ type of malware that is triggered by the user. code automatically makes copies of itself.
Report Question
0%
Virus
0%
Worm
0%
Keystroke logger
0%
Toolbar
Which of the following may result in a malware infection?
Report Question
0%
Opening an email attachment
0%
Downloading a file from a website
0%
Clicking on an infected link
0%
All of the above
What damage can be caused by malware?
Report Question
0%
Computer crashes
0%
The compromising personal information, which may lead to identity theft
0%
Permanent deletion
0%
All of the above
The _____ type of malware, that covertly collects personal information and sends it to a third party.
Report Question
0%
Worm
0%
Toolbar
0%
Homepage hijacker
0%
Spyware
Which of the following is not effective in preventing malware infections?
Report Question
0%
Opening email attachments
0%
Turning on Windows Automatic Updates
0%
Installing anti-virus software
0%
Setting Internet Explorer's security setting to medium-high
If you think your computer has a virus, a good first step in solving the problem would be to:
Report Question
0%
Run a virus scan
0%
Reformat the hard drive
0%
Destroy the computer
0%
Do nothing
Special program which can detect and remove viruses from computer is called
Report Question
0%
Virus
0%
Anti virus
0%
Group ware
0%
Custom
What is a Trojan horse?
Report Question
0%
It scans downloads and email attachmentsI
0%
It replicates and makes copies of itself
0%
Is destructive software disguised as something good.
0%
An animal
What is an email attachment
Report Question
0%
Is software downloaded to your computer
0%
Is a computer file sent along with an email message
0%
is a type of malicious software program
0%
A piece of code
What is "crash" as it relates to computers?
Report Question
0%
To destroy the monitor
0%
Smashing the hard drive into the monitor
0%
The system stops functioning properly
0%
To bang the mouse on the keyboard
What is an example of a firewall being effective.
Report Question
0%
When someone tries to hack your computer
0%
When a certain website might be blocked
0%
Stealing a password
0%
It's literally a wall on fire...easy
It is a self-replicating program that is harmful to networks.
Report Question
0%
Worm
0%
Trojan Horse
0%
Virus
It help prevent attackers from monitoring or recording traffic between resources and computers, by making data more difficult to read.
Report Question
0%
Data Encryption
0%
Firewall
0%
Antivirus
Is this a legitimate email?
Report Question
0%
True
0%
False
How many reported incidents of Phishing happened in 2020? Source: FBI
Report Question
0%
241,324
0%
300,875
0%
19,765
0%
956,321
What is adware?
Report Question
0%
Various pop-ups advertisements that show up on your computer, persuading the user to click it
0%
Adjectives that float across your screen
0%
conceals its true content to fool someone into clicking it
0%
When your computer starts to wear down
Can spyware be seen on your computer?
Report Question
0%
Yes
0%
No
0%
Sometimes
0%
With specialist software
What is a virus?
Report Question
0%
Malware hidden in another file
0%
Any type of malware
0%
A cookie
0%
A breed of gecko
What does DDoS Stand for?
Report Question
0%
Distributed Denial of Service
0%
Delayed Destruction of Server
0%
Delayed Denial of Style
0%
Delayed Denial of Service
What is gaining unauthorised access to a computer system also known as?
Report Question
0%
Hacking
0%
Spamming
0%
Phishing
0%
Logging on
Which of the following is NOT an offence under the Computer Misuse Act?
Report Question
0%
unauthorised access to someone else's files
0%
unauthorised access to someone else's files with intent to commit further criminal offences
0%
copying software and trying to sell it to someone for a profit
0%
writing and distributing a virus
Storing customer data insecurely. Which law would be broken?
Report Question
0%
Data Protection Act 1998
0%
Computer Misuse Act 1990
0%
Copyright Designs and Patents Act 1988
0%
General Data Protection Regulation Act 2018
Why do we use flowcharts?
Report Question
0%
To represent algorithms in an easy way
0%
To use different maths shapes
What does this symbol represent?
Report Question
0%
Start
0%
Sub
0%
Decision
0%
Process
What is this symbol used for in a flowchart?
Report Question
0%
A decision/question
0%
A task to carry out
What does this shape represent?
Report Question
0%
Input/Output
0%
Decision
0%
Process
0%
Start/Stop
Which symbol shows input?
Report Question
0%
oval
0%
parallelogram
0%
rectangle
0%
diamond
What's missing from this part of a flowchart?
Report Question
0%
An Arrow
0%
A Line
0%
A Square
0%
A Diamond
What is the Output if the user enters:Yes
Report Question
0%
Leave umbrella at home
0%
Take an umbrella
What is the Output if the temperature is: 19
Report Question
0%
Below Freezing
0%
Above Freezing
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page