Introduction To Cyber Security MCQ: Security Threats and Vulnerabilities- Security threats, Cyber crime, Cyber terrorism

Security Threats and Vulnerabilities MCQ- Security threats, Cyber crime, Cyber terrorism : Link1

Introduction To Cyber Security MCQ & Answers

       Are you worried about the answers to Introduction To Cyber Security-Security Threats and Vulnerabilities MCQ- Security threats, Cyber crime, Cyber terrorism questions? We have arranged the Show Answer button under the each question. Candidates can click on it to know the right option among the given alternatives. Furthermore, the applicants can check our web portal @ www.totalmcq.com to take part in more MCQ on various subject. Wish, the given information about the Introduction To Cyber Security MCQ will helpful to the advance and can learn the various types of questions and answers.


Q.1. Threat can lead to attacks on computer systems-------------- and more.

A. Network                                                    B. Hub
C. Host                               D. code

Q.2. Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.

A. Softness                                                                B. Weakness
C. Preakness                                                           D. Attack

Q.3. Threat can be either ‘Intentional’ or ---------

A. Natural
B. Individual
C. Accidental
D. Capable

Q.4. Most of the popular banking threats come from the ----- family.

A. Worms                                                                    B. Spyware
C. Shareware                                                                 D. Trojan

Q.5. Key logger is very powerful threat to --------- peoples login credential such as username & password.

A. Steal                                                      B. Avoid
C. return                                                       D. open

Q.6. A--------- website which is designed to look almost like the actual website is form of phishing attack.

A. Real                                                                  B. Local
C. Global                                                                  D. Fake

Q.7. Bluesnarfing is all about having an unauthorized access to a specific ------- phones, laptops or a PDA. Via Bluetooth connection.

A. Network                                                           B. Car
C. Mobile                                                            D. Printer

Q.8. Passwords are used for -----------

A. Access                                                                      B. Searching
C. linking                                                                 D. authentication

Q.9. There are --------- types of passwords.

A. Two                                                                         B. three
C. Four                                                                           D. Five

Q.10. Cyber Crime encompasses any criminal act dealing with computer and -------------

A. Printer                                                   B. Network
C. Man                                                    D. Technology

Q.11. Cyber terrorism is the use of ----------- in terrorist activities.

A. Internet                                                                                     B. terrorist
C. hackers                                                                                    D. Crackers

Q.12. IWM Stands for –------------

A. Information Warfare Monitor                                                                           B. Information Website Monitor
C. Infrastructure Website Monitor                                                     D. Information Web Manipulator

Q.13. The IWM collects ---------- information from the press and other sources tracking global trends in.

A. Open source                                                                           B. Close Source
C. First Source                                                        D. Last Source

Q.14. Privacy Control Protecting ---------. A] B]

A. Your Privacy
B. Your Security

Q.15. For securing the system make backups of important ----------- & Folders.

A. Files                                                           B. Reports
C. Data                                                      D. All of the above