Instruction
quiz
Question
schedule
Previous Questions
quiz
Explanation - Yes
scoreboard
Score - No
Cyber Security - 1
Next internet-netwrok 1

1. What is the full form of the term WEP used with WiFi security ?

JOA-IT 913 *
Correct : D
Explanation: WEP stands for Wired Equivalent Privacy. It's a security protocol that was introduced in 1997 to protect wireless network data. WEP is part of the IEEE 802.11 standard, which aims to provide wireless local area networks (WLANs) with a similar level of security and privacy as wired LANs.

2. Plaintext is transformed into ___ by applying an encryption alogrthm.

JOA-IT 913 *
Correct : A
Explanation: In cryptography, an encryption algorithm transforms plaintext into ciphertext. The process of transforming plaintext into ciphertext is called encryption. The process of transforming ciphertext back into plaintext is called decryption.

3. The famous WanaCry malware is an example of ________

JOA-IT 817 *
Correct : D
Explanation: WannaCry is an example of crypto ransomware, a type of malware that cybercriminals use to extort money. WannaCry is a crypto ransomware worm that targets Windows PCs. It can spread from PC to PC across networks and encrypt critical files. The perpetrators then demand ransom payments to unlock those files.

4. A _____ is a malware that grabs the keystrokes pressed by the user and sends them to the hacker.

JOA-IT 817 *
Correct : D
Explanation: A keylogger is a type of malware or hardware that records a user's keystrokes and sends them to a hacker. Keyloggers are also known as keystroke loggers or keyboard capturing.

5. Which of the following is a Microsft anti-malware that provides real-time protection against viruses, malware and spyware ?

JOA-IT 817 *
Correct : B
Explanation: Microsoft Defender Antivirus is a Microsoft anti-malware that provides real-time protection against viruses, malware, and spyware. It's built into Windows 10 and Windows 11.

6. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information ?

Correct : A
Explanation: A cyber attack is an attempt to gain unauthorized access to a computer, computer system, or network. The goal is to cause damage by disabling, disrupting, destroying, or controlling computer systems. Cyber attacks can also alter, block, delete, manipulate, or steal data.

7. __________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.

Correct : B
Explanation: Malware, or malicious software, is a term for any type of software that is intentionally harmful to a computer, network, or server. Cybercriminals, also known as hackers, develop malware to steal data and damage or destroy computers and computer systems.

8. Software piece of code that replicates to cause a damage in computer system

Correct : A
Explanation: A computer virus is a type of malware that can cause damage to data and software. Viruses can attach themselves to other programs, replicate, and spread to other devices. When executed, a virus can modify other computer programs by inserting its own code into them.

9. The common name for the crime of stealing passwords is ?

Correct : A
Explanation: Spoofing is a cybercriminal activity where someone disguises themselves as a trusted source. The goal is to gain access to personal information, money, or data.

10. Which is not firewall technique ?

Correct : D
Explanation: A proxy server is a cybersecurity element that acts as a mediator between users and networks.

11. VIRUS stands for ?

Correct : B
Explanation : Virus stands for Vital Information Resources under Siege. A computer virus is a type of malware that can cause damage to data and software

12. Data encryption is used for ?

Correct : A
Explanation: Data encryption is a security method that converts data into a code that can only be read by people with a secret key or password. The encrypted data is called ciphertext, and the unencrypted data is called plaintext.
Next 1

COMPUTER

Chapter

Introduction to Computer
Hardware & Software
Operating System
Internet & Computer Network
E-mail & Social Services
Cyber Security
C Language
Web designing
Copyright © 2023! All right are reserved