Sei sulla pagina 1di 4

Meet RMITU @Suntec Fri 13 Sep

OPEN
Meet RMITU @Suntec for Arch, Commerce, Food Sc, Radiography etc Fri 13 Sep
(1 day only) OverseasEducation.sg

Cyber Security MCQ SET- 13 A+ A  A-

Cyber Security Multiple Choice Questions and Answers MCQ “SET 13”

1 . Which of the following refers to programs that surreptitiously monitor activity on a computer system and report
that information to others without the user's consent?
A. Malware
B. Botnet
C. Trojan horse
D. Spyware
View Answer

2 . What is a computer worm?


A. It is software designed to exploit networks.
B. It is software designed to analyze and search for open ports.
C. It is a software utilized to scan packets on open networks.
D. It is malware designed to infect other computers.
View Answer

3 . Is a Unix-based system vulnerable to viruses?


A. Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
B. Yes, the majority of viruses attack Unix-based systems.
C. No. Linux systems are totally impervious to attacks.
D. Yes, however the majority are coded to attack Windows-based systems.
View Answer

4 . Which of the following protocol used Port 443 and Port 80 respectively
A. HTTPS and HTTP
B. XHTML
C. HTTP and HTTPS
D. DHTML
View Answer

5 . Which of the following is a means to access a computer program or entire computer system bypassing all
security mechanisms?
A. Backdoor
B. Masquerading
C. Phishing
D. Trojan Horse
View Answer

6 . What does TCP mean?


A. Total Content Positioning
B. Transmission Control Protocol
C. Transmittable Constant Protocol
D. Technical Control Panel
View Answer

7 . What does cross-site scripting allow for attackers?


A. Direct introduction of viruses into a victims computer.
B. The introduction of worm viruses into the victims website.
C. A phishing attack that automatically downloads the victims personal information.
D. Injection of client-side scripts into web pages.
View Answer

8 . Which of the following is collection of Internet-connected programs communicating with other similar programs in
order to perform tasks?
A. Botnet
B. Spyware
C. Trojan horse
D. Malware
View Answer

9 . What are TLS and SSL?


A. Internet protocols.
B. Network layers.
C. Internet layers
D. Cryptographic protocols.
View Answer

10 . Who was TLS defined by?


A. The DEA
B. OSHA
C. Internet Engineering Task Force
D. NSA
View Answer

 Previous
Cyber Security MCQ SET- 12

Next 
Cyber Security MCQ SET- 14

TABLE OF CONTENTS

 Cyber Security MCQ Set 1

 Cyber Security MCQ Set-2


 Cyber Security MCQ Set-3

 Cyber Security MCQ Set-4

 Cyber Security MCQs Set-5

 Cyber Security MCQs Set-6

 Cyber Security MCQs Set-7

 Cyber Security MCQs Set-8

 Cyber Security MCQs Set-9

 Cyber Security MCQ SET- 10

 Cyber Security MCQ SET- 11

 Cyber Security MCQ SET- 12

 Cyber Security MCQ SET- 13

 Cyber Security MCQ SET- 14

 Cyber Security MCQ SET- 15

 Cyber Security MCQ SET- 16

 Cyber Security MCQ SET- 17

 Cyber Security MCQ SET- 18

 Cyber Security MCQ SET- 19

 Cyber Security MCQ SET- 20

 Cyber Security MCQ SET- 21

 Cyber Security MCQ SET- 22

 Cyber Security MCQ SET- 23

 Cyber Security MCQ SET- 24

 Cyber Security MCQ SET- 25

 Cyber Security MCQ SET- 26

 Cyber Security MCQ SET- 27


 Cyber Security MCQ SET- 28

 Cyber Security MCQ SET- 29

 Cyber Security MCQ SET- 30

SPONSORED SEARCHES

computer programming linux os

windows 7 operating system ssl website

If you have any Questions regarding this free Computer Science tutorials ,Short Questions and Answers,Multiple choice
Questions And Answers-MCQ sets,Online Test/Quiz,Short Study Notes don’t hesitate to contact us via Facebook,or through
our website.Email us @ examradar@Gmail.com We love to get feedback and we will do our best to make you happy.

Copyright © 2019 | ExamRadar. | Contact Us | Copyright || Terms of Use || Privacy Policy

Potrebbero piacerti anche