You are on page 1of 7

1. What is Cyber Security?

a) Cyber Security provides security against malware


b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned

2. What does cyber security protect?


a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

3. Who is the father of computer security?


a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer
systems, networks, or their associated information?
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
5. Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
6. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
7. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
8. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
9. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
10. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
11. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
12. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
13. _____________ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
14. With respect to physical media, STP cables stands for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
15. The attacker using a network of compromised devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net
16. The first computer virus is
(A) The famous
(B) HARLIE
(C) PARAM
(D) Creeper
17. The first PC virus was developed in
(A) 1980
(B) 1986
(C) 1988
(D) 1999
18. Which one of the following is a key function of firewall?
(A) Copying
(B) Moving
(C) Deleting
(D) Monitoring

19. In asymmetric key cryptography, the private key is kept by __________


a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
20.  Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) dsa algorithm
21. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
22.  Cryptanalysis is used __________
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) to make new ciphers
23. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
24. Multiple objects can be sent over a TCP connection between client and server in a
persistent HTTP connection.
a) True
b) False

25.  HTTP is ________ protocol.


a) application layer
b) transport layer
c) network layer
d) data link layer

26.  In the network HTTP resources are located by __________


a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) Union resource locator

27. FTP server listens for connection on which port number?


a) 20
b) 21
c) 22
d) 23

28.  The File Transfer Protocol is built on __________


a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture

29. Risk management is one of the most important jobs for a


a) Client
b) Investor
c) Production team
d) Project manager

30. Which of the following risk is the failure of a purchased component to perform as
expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk

31. Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition

32. E-Commerce stands for _______.


A. Electrical Commerce
B. Electronic Commerce
C. Entertainment Commerce
D. Electro Chemical Commerce

33. ________ is NOT a function of E commerce.


A. Warehouse
B. Finance
C. Marketing
D. None of the above

34 E-commerce has _____ scope than E-Business or Digital Business.


A. Higher
B. Wider
C. Narrower
D. More

35 All electronically mediated information exchanges are known as _____


A. E-Business
B. E-Commerce
C. Digital Business
D. None of the above

36. Social collaboration is ______.


A. Group-centric
B. Individual-centric
C. Organization-centric
D. Person-centric

37. ________is part of the four main types for e-commerce.


A. B2B
B. P2P
C. C2A
D. All of the above

38 A digital signature is a mathematical technique which validates?

A. authenticity
B. integrity
C. Non-repudiation
D. All of the above
39. _____________ is a process which verifies the identity of a user who wants to access the
system.

A. Authentication
B. Non-repudiation
C. Integrity
D. None of the above

40. How many algorithms digital signature consists of?

A. 2
B. 3
C. 4
D. 5

41. Which algorithm algorithm provides the private key and its corresponding public key?

A. Key generation algorithm


B. Signature verifying algorithm
C. Signing algorithm
D. None of the above

42.  Which of the following is not a type of digital signature?

A. Approval Signatures
B. Non-Certified Signatures
C. Visible Digital Signature
D. Invisible Digital Signature

43. A software bug is an ?

A. error
B. fault
C. flaw
D. All of the above

44.  The process of finding and fixing bugs is termed?

A. Exception
B. Bugs handling
C. Debugging
D. Error handling

45. In software testing, the bug can occur for the?

A. Wrong coding
B. Missing coding
C. Extra coding
D. All of the above

46. A _________ is a software bug that attackers can take advantage to gain unauthorized
access in a system.

A. System error
B. Bugged system
C. Security bug
D. System virus

47. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
a) Application
b) Host to host
c) Internet
d) Network Access

48.  Cable TV and DSL are examples of ____________


a) Interconnection of network
b) LAN
c) MAN
d) WAN

49.  In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data

50. Transmission Control Protocol/Internet Networking Protocol have ___________


a) Four Layers
b) Five Layers
c) Six Layers
d) Seven Layers

You might also like