MCQ- Biginers MCQ for biginers who are intially starting study about cyber security & cyber forensics. Page 1 of 50 Which of the following is NOT a type of malware? Virus Worm Firewall Trojan Page 2 of 50 Which protocol is used for secure web browsing? HTTP FTP HTTPS SMTP Page 3 of 50 Phishing attack is mainly conducted via: EMAIL PRINTER SCANNER KEYBOARD Page 4 of 50 What does VPN stand for? Virtual Private Network Virtual Personal Node Variable Processing Network Virtual Protected Net Page 5 of 50 A strong password should ideally include: Only alphabets Only numbers Combination of letters, numbers, and symbols Only dictionary words Page 6 of 50 The process of converting plaintext into unreadable text is called: Decryption Encryption Hashing Compression Page 7 of 50 Which of the following is used in two-factor authentication? Password only OTP with password Username only Email ID only Page 8 of 50 Firewall works on which layer of OSI model (commonly)? Application Layer Network Layer Transport Layer Session Layer Page 9 of 50 Ransomware is used to: Steal money from bank accounts Encrypt victimās data and demand ransom Steal hardware devices Hack Wi-Fi networks only Page 10 of 50 What is Social Engineering? Manipulating people to reveal confidential info Designing websites Encrypting emails Using social media only Page 11 of 50 Which file system is mostly used in Windows? EXT4 FAT32/NTFS HFS+ APFS Page 12 of 50 Which tool is commonly used for disk imaging in forensics? EnCase Photoshop VLC Player WinRAR Page 13 of 50 MD5 and SHA-1 are examples of: Encryption algorithms Hashing algorithms Compression tools Firewalls Page 14 of 50 Chain of Custody refers to: Evidence handling process in forensics A type of firewall Digital signature method Antivirus update process Page 15 of 50 Which of these is volatile data? RAM contents Hard disk data USB drive files CD-ROM files Page 16 of 50 What does āWrite Blockerā do in digital forensics? Blocks malware Prevents writing on evidence media Blocks USB ports Encrypts hard disk Page 17 of 50 The first step in computer forensics is: Report writing Data acquisition Evidence preservation Court testimony Page 18 of 50 Volatile memory is lost when: System is rebooted or powered off Hard disk is formatted Data is encrypted Antivirus runs Page 19 of 50 Which log file is useful in investigating a web server attack? System logs Access logs Printer logs USB logs Page 20 of 50 Steganography means: Encrypting data Hiding data inside another file Cracking passwords Tracking GPS locations Page 21 of 50 The IT Act in India was implemented in: 1999 2000 2002 2005 Page 22 of 50 Cyber crime against women like online stalking comes under which section of IT Act? Section 66A Section 66E Section 67 Section 72 Page 23 of 50 Unauthorized access to a computer is called: Cracking Hacking Spoofing Logging Page 24 of 50 Which is an example of identity theft? Sending spam emails Using someoneās credit card info Downloading music illegally Buying products online Page 25 of 50 Cyberbullying generally happens on: Social media Banks ATMs Police stations Page 26 of 50 Botnets are mainly used for: DDoS attacks Data compression Password storage Email backups Page 27 of 50 Cyber crime police can trace an email source using: Browser history Email header Cache memory Word file Page 28 of 50 What is spoofing? Pretending to be another person/system Encrypting data Erasing logs Sending bulk SMS Page 29 of 50 CERT-In stands for: Cyber Emergency Response Team ā India Central Emergency Resource Team ā India Cyber Enquiry and Reporting Team ā India Cyber Evidence Recovery Team ā India Page 30 of 50 Which Indian law deals with cyber crimes? Indian Penal Code (IPC) IT Act, 2000 Evidence Act RTI Act Page 31 of 50 Brute force attack is: Guessing password by trial and error Encrypting data Deleting logs Flooding a server with traffic Page 32 of 50 SQL Injection targets: Operating system Database Network cables Printer Page 33 of 50 The process of converting encrypted text back to normal is: Hashing Encryption Decryption Encoding Page 34 of 50 Which one is an Antivirus software? Kali Linux Wireshark Avast Burp Suite Page 35 of 50 Keylogger records: Network packets Keystrokes Disk usage Video files Page 36 of 50 The process of hiding oneās IP address is called: Spoofing Anonymization Encoding Hashing Page 37 of 50 Digital signature is used to ensure: Confidentiality Integrity & authenticity Encryption Password cracking Page 38 of 50 Which device connects different networks? Switch Router Hub Repeater Page 39 of 50 What does DOS in DoS attack stand for? Denial of Service Disk Operating System Data Over System Domain of Security Page 40 of 50 The most common cyber attack on websites is: Defacement Eavesdropping Wiretapping Shoulder surfing Page 41 of 50 Which of the following is an email protocol? SMTP SNMP ICMP ARP Page 42 of 50 Incognito mode in browsers prevents: Websites from loading Local storage of history/cookies Server-side tracking Encryption Page 43 of 50 The full form of URL is: Uniform Resource Locator Universal Routing Language Unified Record Locator Unique Routing Link Page 44 of 50 Which one is not an operating system? Windows Linux Android Oracle Page 45 of 50 Which device is most vulnerable to SIM swapping attacks? Mobile phone Router Laptop Printer Page 46 of 50 In cybersecurity CIA triad, āCā stands for: Control Confidentiality Code Certificate Page 47 of 50 Which of the following is a biometric authentication method? Password OTP Fingerprint CAPTCHA Page 48 of 50 ARP poisoning is related to: Email attacks Network attacks File encryption Disk corruption Page 49 of 50 What is the main purpose of IDS (Intrusion Detection System)? Detect unauthorized access Encrypt files Speed up computer Install antivirus Page 50 of 50 Zero-day vulnerability means: Attack occurs on the same day software is released Attack discovered but not patched yet Attack on 1st January only No impact attack Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Start Quiz