Computer Security Basics MCQs | BCE MCQs

Hello Friends !!! I am from quickstudyhelper.com. In today’s post, we are going to see very important ‘Computer Security Basics MCQs | BCE MCQs’ which help you in your examination.

RGPV Unit – 4 BCE Computer Security Basics MCQs

If you need any help from us or you want to give any suggestion to us, then definitely talk to us.

You can also follow us on social media. You will find our social media links at the end of the page

Feel Free to talk with us on WhatsApp – Click Here

Q1. The full form of Malware is ________

1. Malfunctioned Software
2. Multipurpose Software
3. Malicious Software
4. Malfunctioning of Security

Answer:- 3) Malicious Software

Q2. Who deploy Malwares to a system or network?

1. Criminal Organizations, Black Hat Hackers, Malware Developers, Cyber-terrorists
2. Criminal Organizations, White Hat Hackers, Malware Developers, Cyber-terrorists
3. Criminal Organizations, Black Hat Hackers, Software Developers, Cyber-terrorists
4. Criminal Organizations, Gray Hat Hackers, Malware Developers, Penetration testers

Answer:- 1) Criminal Organizations, Black Hat Hackers, Malware Developers, Cyber-terrorists

Q3.  _____________ is a code injecting method used for attacking the database of a system / website.

1. HTML injection
2. SQL Injection
3. Malicious code injection
4. XML Injection

Answer:- 2) SQL Injection

Q4. XSS is abbreviated as __________

1. Extreme Secure Scripting
2. Cross-Site Security
3. X Site Scripting
4. Cross-Site Scripting

Answer:- 4) Cross-Site Scripting

Q5. This attack can be deployed by infusing malicious code in a website’s comment section. What is “this” attack referred to here?

1. SQL injection
2. HTML Injection
3. Cross-Site Scripting (XSS)
4. Cross-Site Request Forgery (XSRF)

Answer:- 3) Cross-Site Scripting (XSS)

Q6. When there is an excessive amount of data flow, which the system cannot handle, a _____ attack takes place.

1. Database Crash Attack
2. DoS (Denial of Service) attack
3. Data Overflow Attack
4. Buffer Overflow Attack

Answer:- 4) Buffer Overflow Attack

Q7. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

1. session hijacking
2. session fixation
3. cookie stuffing
4. session spying

Answer:- 1) session hijacking

Q8. Which of these is an example of physical hacking?

1. Remote Unauthorised Access
2. Inserting malware loaded USB to a system
3. SQL Injection on SQL vulnerable site
4. DDOS (Distributed Denial of Service) attack

Answer:- 2) Inserting malware loaded USB to a system

Q9. Which of them is not a wireless attack?

1. Eavesdropping
2. MAC Spoofing
3. Wireless Hijacking
4. Phishing

Answer:- 4) Phishing

Q10.  An attempt to harm, damage, or cause threat to a system or network is broadly termed as ______

1. cyber-crime
2. cyber attack
3. system hijacking
4. digital crime

Answer:- 2) cyber attack

Q11  Which method of hacking will record all your keystrokes?

1. Keyhijacking
2. Keyjacking
3. Keylogging
4. Keyboard monitoring

Answer:- 3) Keylogging

Q12.  _________ are the special type of programs used for recording and tracking user’s keystrokes.

1. Keylogger
2. Trojans
3. Virus
4. Worms

Answer:- 1) Keylogger

Q13. These are collective terms for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

1. Malware
2. Remote Access Trojans
3. Keyloggers
4. Spyware

Answer:-  4) Spyware

Q14. Stuxnet is a  _________

1. worm
2. virus
3. trojan
4. antivirus

Answer:- 1) worm

Q15.  ___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

1. Cyber-warfare
2. Cyber campaign
3. Cyber-terrorism
4. Cyberattack

Answer:- 3) Cyber-terrorism

Also Read –

Q16. In general how many key elements constitute the entire security structure?

1. 1
2. 2
3. 3
4. 4

Answer:- 4) 4

Q17. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

1. Confidentiality
2. Integrity
3. Authenticity
4. Availability

Answer:- 3) Authenticity

Q18. This is the model designed for guiding the policies of Information security within a company, firm, or organization. What is “this” referred to here?

1. Confidentiality
2. Non-repudiation
3. CIA Triad
4. Authenticity

Answer:- 3) CIA Triad

Q19. CIA triad is also known as ________

1. NIC (Non-repudiation, Integrity, Confidentiality)
2. AIC (Availability, Integrity, Confidentiality)
3. AIN (Availability, Integrity, Non-repudiation)
4. AIC (Authenticity, Integrity, Confidentiality)

Answer:- 2) AIC (Availability, Integrity, Confidentiality)

Q20. When you use the word _____ it means you are protecting your data from getting disclosed.

1. confidentiality
2. integrity
3. authentication
4. availability

Answer:- 1) confidentiality

Q21. ______ means the protection of data from modification by unknown users.

1. Confidentiality
2. Integrity
3. Authentication
4. Non-repudiation

Answer:- 2) Integrity

Q22. When integrity is lacking in a security system, _________ occurs.

1. database hacking
2. data deletion
3. data tampering
4. data leakage

Answer:- 3) Data tampering

Q23.  _______ of information means, only authorized users are capable of accessing the information.

1. Confidentiality
2. Integrity
3. Non-repudiation
4. Availability

Answer:- 1) Confidentiality

Q24. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

1. They help understanding hacking better
2. They are key elements to a security breach
3. They help understands security and its components better
4. They help to understand the cyber-crime better

Answer:- 3) They help understands security and its components better

Q25. This helps in identifying the origin of information and authentic user. This referred to here as __________

1. confidentiality
2. integrity
3. authenticity
4. availability

Answer:- 3) authenticity

Q26. Data ___________ is used to ensure confidentiality.

1. encryption
2. locking
3. deleting
4. backup

Answer:- 1) encryption

Q27. Which of these is not a proper method of maintaining confidentiality?

1. Biometric verification
2. ID and password-based verification
3. 2-factor authentication
4. Switching off the phone

Answer:- 4) Switching off the phone

Q28. Data integrity gets compromised when _____ and _____ are taken control off.

1. access control, file deletion
2. network, file permission
3. access control, file permission
4. network, system

Answer:- 3) access control, file permission

Q29. ______ is the latest technology that faces an extra challenge because of CIA paradigm.

1. Big data
2. Database systems
3. Cloud storages
4. Smart dust

Answer:- 1) Big data

Q30. One common way to maintain data availability is __________

1. data clustering
2. data backup
3. data recovery
4. data altering

Answer:- 2) data backup

I hope you like this ‘Computer Security Basics MCQs’ post.

Explore Quick Study Helper to discover the best resources for learning. Quick Study Helper has the best in terms of quality content and educational value.

Please like, share, and follow us on social media

Thank You.

Leave a Comment