Cyber Security Quiz 2021

 Cyber security , Cyber Security Quiz 2021

Cyber Security Quiz 2021

Cyber Security Quiz 2020-2021 by K V No.1 Roorkee.

Test your knowledge on Cyber Security and safety

There is no any registration fee. In this quiz competition anyone can participate . There is total 20 MCQ questions.

After Quiz Completion Everyone Will Receive A Participation Certificate on Your Email Id.

Here You can sell all the questions which are asked in this quiz competition

1. Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?


Section 66D

Section 66C

Section 66B

Section 66F


2. Which one of the following can protect a computer from the risk of unwanted emails?


Anti-virus software.

Anti-spam software.

PC diagnostic software.

Anti-spyware software.


3. Which one of the following should you use to backup personal data?


A friends computer

A Printout

A website offering file sharing service

A Labelled CD


4. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …


Ransomware

Spamming

Botnet

Phishing


5. You are on a business trip and sitting in the local cafe trying to send emails to your colleagues to catch up on a few tasks.


Turn off your file sharing

Use a Virtual Private Network (VPN)

Find the strongest WiFi signal near you

Use private browsing


6. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?


That the site is not accessible to certain computers

That the site is the newest version available

That information entered into the site is encrypted

That the site has special high definition


7. Which Act in India focuses on data privacy and information technology?


Banking Regulation Act 1949

Indian Penal Code

IT Act 2000

IT (amendment) Act 2008


8. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?


Key-logging

De-anonymization by network operators

Use of insecure Wi-Fi networks

Phishing attacks


9. Which one of the following describes why it is important to update antivirus software regularly?


To protect your computer from all known viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.


10. Which one of the following describes why firewalls are used?


To prevent destruction of a computer in the event of a fire.

To prevent unauthorised access by incoming transmissions.

To detect and disable viruses already on a computer.

To enable easy downloading of data from web sites.


11. Which one of the following is MOST likely to be a hoax?


An email advertisement from a local shop you subscribe to.

An email with an attachment sent by a colleague using their personal email address.

An email asking you to go to a website for a free computer scan.

An email from a friend you have not seen recently.


12. Which one of the following is the recommended action to prevent the risk of access to a network by other users?


Disconnect the computer from the network.

Change the default WEP or WPA access key to one that only you know.

Complain to the System Administrator

Adjust the Internet security settings.


13. A group of computers that is networked together and used by hackers to steal information is called a …


Operating system

DDoS

Botnet

Rootkit


14. Which of the following four passwords is the most secure?


mydateofbirth@

Password123

Grisha@923#1089

123Brinda


15. This type of attack is designed to hinder the normal operation of a website, or other network resource.


Ransomware

Phishing

DoS attack

PoS attack


16. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?



Option 1

Option 2

Option 3

None of these


17. Which one of the following would be considered the BEST way to store a PIN number?


Keep a written note of it in your office drawer.

Store it on your computer

Keep a written note of it with you bank cards.

Memorise it.


18. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?


Yes, it is safe

No, It is not Safe

Safe and unsafe

None of these


19. Which of the following is an example of a “phishing” attack?


Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the above


20. What is the penalty for publishing images of a person's private parts without consent, as per IT Act 2000?


Life imprisonment

5 years imprisonment or 5 lakh rupees penalty or both

Two year imprisonment or 1 lakh rupees penalty or both

3 years imprisonment or 2 lakh rupees penalty or both


For Participating in This Quiz :  Click Here

Please Like and Subscribe My Youtube Channel (CS TECH)  For More Quizzes and Free Certification Courses Click On The Following Link

Youtube Channel Link:CS TECH

Post a Comment

0 Comments