Hello Friends !!! I am from quickstudyhelper.com. In today’s post, we are going to see very important ‘Computer Security Basics MCQs | BCE MCQs’ which help you in your examination.
RGPV Unit – 4 BCE Computer Security Basics MCQs
If you need any help from us or you want to give any suggestion to us, then definitely talk to us.
You can also follow us on social media. You will find our social media links at the end of the page
Feel Free to talk with us on WhatsApp – Click Here
Q1. The full form of Malware is ________
1. Malfunctioned Software
2. Multipurpose Software
3. Malicious Software
4. Malfunctioning of Security
Answer:- 3) Malicious Software
Q2. Who deploy Malwares to a system or network?
1. Criminal Organizations, Black Hat Hackers, Malware Developers, Cyber-terrorists
2. Criminal Organizations, White Hat Hackers, Malware Developers, Cyber-terrorists
3. Criminal Organizations, Black Hat Hackers, Software Developers, Cyber-terrorists
4. Criminal Organizations, Gray Hat Hackers, Malware Developers, Penetration testers
Answer:- 1) Criminal Organizations, Black Hat Hackers, Malware Developers, Cyber-terrorists
Q3. _____________ is a code injecting method used for attacking the database of a system / website.
1. HTML injection
2. SQL Injection
3. Malicious code injection
4. XML Injection
Answer:- 2) SQL Injection
Q4. XSS is abbreviated as __________
1. Extreme Secure Scripting
2. Cross-Site Security
3. X Site Scripting
4. Cross-Site Scripting
Answer:- 4) Cross-Site Scripting
Q5. This attack can be deployed by infusing malicious code in a website’s comment section. What is “this” attack referred to here?
1. SQL injection
2. HTML Injection
3. Cross-Site Scripting (XSS)
4. Cross-Site Request Forgery (XSRF)
Answer:- 3) Cross-Site Scripting (XSS)
Q6. When there is an excessive amount of data flow, which the system cannot handle, a _____ attack takes place.
1. Database Crash Attack
2. DoS (Denial of Service) attack
3. Data Overflow Attack
4. Buffer Overflow Attack
Answer:- 4) Buffer Overflow Attack
Q7. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________
1. session hijacking
2. session fixation
3. cookie stuffing
4. session spying
Answer:- 1) session hijacking
Q8. Which of these is an example of physical hacking?
1. Remote Unauthorised Access
2. Inserting malware loaded USB to a system
3. SQL Injection on SQL vulnerable site
4. DDOS (Distributed Denial of Service) attack
Answer:- 2) Inserting malware loaded USB to a system
Q9. Which of them is not a wireless attack?
1. Eavesdropping
2. MAC Spoofing
3. Wireless Hijacking
4. Phishing
Answer:- 4) Phishing
Q10. An attempt to harm, damage, or cause threat to a system or network is broadly termed as ______
1. cyber-crime
2. cyber attack
3. system hijacking
4. digital crime
Answer:- 2) cyber attack
Q11 Which method of hacking will record all your keystrokes?
1. Keyhijacking
2. Keyjacking
3. Keylogging
4. Keyboard monitoring
Answer:- 3) Keylogging
Q12. _________ are the special type of programs used for recording and tracking user’s keystrokes.
1. Keylogger
2. Trojans
3. Virus
4. Worms
Answer:- 1) Keylogger
Q13. These are collective terms for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.
1. Malware
2. Remote Access Trojans
3. Keyloggers
4. Spyware
Answer:- 4) Spyware
Q14. Stuxnet is a _________
1. worm
2. virus
3. trojan
4. antivirus
Answer:- 1) worm
Q15. ___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.
1. Cyber-warfare
2. Cyber campaign
3. Cyber-terrorism
4. Cyberattack
Answer:- 3) Cyber-terrorism
Also Read –
- Computer and Operating System MCQs – Click Here
- Computer Network MCQs – Click Here
- See Other MCQs – Click Here
Q16. In general how many key elements constitute the entire security structure?
1. 1
2. 2
3. 3
4. 4
Answer:- 4) 4
Q17. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
1. Confidentiality
2. Integrity
3. Authenticity
4. Availability
Answer:- 3) Authenticity
Q18. This is the model designed for guiding the policies of Information security within a company, firm, or organization. What is “this” referred to here?
1. Confidentiality
2. Non-repudiation
3. CIA Triad
4. Authenticity
Answer:- 3) CIA Triad
Q19. CIA triad is also known as ________
1. NIC (Non-repudiation, Integrity, Confidentiality)
2. AIC (Availability, Integrity, Confidentiality)
3. AIN (Availability, Integrity, Non-repudiation)
4. AIC (Authenticity, Integrity, Confidentiality)
Answer:- 2) AIC (Availability, Integrity, Confidentiality)
Q20. When you use the word _____ it means you are protecting your data from getting disclosed.
1. confidentiality
2. integrity
3. authentication
4. availability
Answer:- 1) confidentiality
Q21. ______ means the protection of data from modification by unknown users.
1. Confidentiality
2. Integrity
3. Authentication
4. Non-repudiation
Answer:- 2) Integrity
Q22. When integrity is lacking in a security system, _________ occurs.
1. database hacking
2. data deletion
3. data tampering
4. data leakage
Answer:- 3) Data tampering
Q23. _______ of information means, only authorized users are capable of accessing the information.
1. Confidentiality
2. Integrity
3. Non-repudiation
4. Availability
Answer:- 1) Confidentiality
Q24. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
1. They help understanding hacking better
2. They are key elements to a security breach
3. They help understands security and its components better
4. They help to understand the cyber-crime better
Answer:- 3) They help understands security and its components better
Q25. This helps in identifying the origin of information and authentic user. This referred to here as __________
1. confidentiality
2. integrity
3. authenticity
4. availability
Answer:- 3) authenticity
Q26. Data ___________ is used to ensure confidentiality.
1. encryption
2. locking
3. deleting
4. backup
Answer:- 1) encryption
Q27. Which of these is not a proper method of maintaining confidentiality?
1. Biometric verification
2. ID and password-based verification
3. 2-factor authentication
4. Switching off the phone
Answer:- 4) Switching off the phone
Q28. Data integrity gets compromised when _____ and _____ are taken control off.
1. access control, file deletion
2. network, file permission
3. access control, file permission
4. network, system
Answer:- 3) access control, file permission
Q29. ______ is the latest technology that faces an extra challenge because of CIA paradigm.
1. Big data
2. Database systems
3. Cloud storages
4. Smart dust
Answer:- 1) Big data
Q30. One common way to maintain data availability is __________
1. data clustering
2. data backup
3. data recovery
4. data altering
Answer:- 2) data backup
I hope you like this ‘Computer Security Basics MCQs’ post.
Explore Quick Study Helper to discover the best resources for learning. Quick Study Helper has the best in terms of quality content and educational value.
Please like, share, and follow us on social media
Thank You.