08th
May
Information Security MCQ

Information Security MCQ

  • Admin
  • 08th May, 2021
  • 607 Followers

Information Security MCQ Quiz

Following are mostly asked Information security MCQ test that are designed for professionals like you to crack you interviews. You can take this Information security online test before appearing to you real interview. This Information security quiz there are around 30+ multiple choice questions on Information security with four options.

1) .......is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

  • A. Information Security
  • B. Database Security
  • C. Network Security
  • D. Physical Security

2) From the options below, which of them is not a threat to information security?

  • A. Information leakage
  • B. Eavesdropping
  • C. Unchanged default password
  • D. Disaster

3) From the options below, which of them is not a vulnerability to information security?

  • A. without deleting data, disposal of storage media
  • B. unchanged default password
  • C. latest patches and updates not done
  • D. flood

4) _____ platforms are used for safety and protection of information in the cloud.

  • A. Cloud security protocols
  • B. Cloud workload protection platforms
  • C. One Drive
  • D. AWS

5) Which of the following information security technology is used for avoiding browser-based hacking?

  • A. Remote browser access
  • B. Anti-malware in browsers
  • C. Incognito mode in a browser
  • D. Adware remover in browsers

6) The full form of EDR is _______

  • A. Endpoint Detection and recovery
  • B. Early detection and response
  • C. Endless Detection and Recovery
  • D. Endpoint Detection and response

7) _______ technology is used for analyzing and monitoring traffic in network and information flow.

  • A. Network Security Firewall
  • B. Network traffic analysis (NTA)
  • C. Cloud access security brokers (CASBs)
  • D. Managed detection and response (MDR)

8) Compromising confidential information comes under _________

  • A. Vulnerability
  • B. Bug
  • C. Threat
  • D. Attack

9) Lack of access control policy is a _____

  • A. Vulnerability
  • B. Threat
  • C. Attack
  • D. Bug

10) Possible threat to any information cannot be ________________

  • A. protected
  • B. reduced
  • C. ignored
  • D. transferred

11) In which of the following, a person is constantly chased by another person or group of several peoples?

  • A. Identity theft
  • B. Stalking
  • C. Bulling
  • D. Phishing

12) Which one of the following can be considered as the class of computer threats?

  • A. Phishing
  • B. Dos Attack
  • C. Soliciting
  • D. both b and c

13) Which of the following is considered as the unsolicited commercial email?

  • A. Virus
  • B. Malware
  • C. Spam
  • D. All of these

14) Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

  • A. Spyware
  • B. Adware
  • C. Malware
  • D. None

15) .......is a type of software designed to help the user's computer detect viruses and avoid them.

  • A. Adware
  • B. Antivirus
  • C. Malware
  • D. None of these

16) Which one of the following is a type of antivirus program?

  • A. Mcafee
  • B. Kaspersky
  • C. Quick heal
  • D. All of these

17) Name of the Hacker who breaks the SIPRNET system?

  • A. John Draper
  • B. Kevin Mitnick
  • C. John von Neumann
  • D. Kevin Poulsen

18) Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?

  • A. Phishing
  • B. Cracking
  • C. Phreaking
  • D. Spraining

19) Which of the following is considered as the first hacker's conference?

  • A. DEFCON
  • B. OSCON
  • C. SECTION
  • D. DEVON

20) Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?

  • A. Client
  • B. Root
  • C. Administrative
  • D. Guest

21) Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user's information?

  • A. Ubuntu
  • B. Tails
  • C. Fedora
  • D. none

22) In order to ensure the security of the data/ information, we need to ____________ the data:

  • A. Decrypt
  • B. Encrypt
  • C. Delete
  • D. none

23) Firewalls are to protect against:

  • A. Fire Attacks
  • B. Data Driven Attacks
  • C. Unauthorized Attacks
  • D. Virus Attacks

24) The first computer virus is:

  • A. Creeper
  • B. PARAM
  • C. The famous
  • D. HARLIE

25) The first PC virus was developed in:

  • A. 1986
  • B. 1987
  • C. 1988
  • D. 1989

26) Joystick allows the movements with:

  • A. 45 degree angle
  • B. 180 degree angle
  • C. 360 degree angle
  • D. 90 degree angle

27) To protect system, there is how many levels of security level?

  • A. one
  • B. two
  • C. three
  • D. four

28) The security of a system can be improved by:

  • A. Threat monitoring
  • B. Audit log
  • C. Both A & B
  • D. none

29) CAP is:

  • A. Simpler and less powerful than that of hydra
  • B. Complex and less powerful than that of hydra
  • C. Simple and greater power than that of hydra
  • D. none

30) L0phtCrack is formerly known as LC3.

  • A. True
  • B. False

31) Which of the following attack-based checks Web Inspect cannot do?

  • A. parameter injection
  • B. injecting shell code
  • C. directory traversal
  • D. cross-site scripting

Information Security Online Test Questions (Information Security FAQs)

1) What is information security?

Information Security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information such that the data of any individual, enterprise, etc. must be safe and secure.

2) What is cryptography?

Cryptography is the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. It is basically used to secure the information from unauthorized access.

3) What is vulnerability in information security?

A vulnerability is a weakness that can be exploited by a cyber attack to gain unauthorized access to perform unauthorized actions on a computer system in order to theft the information, data or exploit the system for unfair means.

4) What are legal ethical and professional issues in information security?

LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY can be stated as enabling the Law i.e. the set of rules that are mandated to prevent unethical behavior. These laws are drawn from ethics i.e. these must be socially acceptable.

5) What are different types of information security?

Different types of information security are:

  • Network security
  • Internet security
  • Endpoint security
  • Cloud security
  • Application security

6) Explain what is cyber attacks? List types.

A cyber attack is an attack done to gain unauthorized access to perform unauthorized actions on a computer system in order to theft the information, data or exploit the system for unfair means. Types of cyber attack are:

  • Injection attacks
  • DNS Spoofing
  • Session Hijacking
  • Phishing
  • Denial of Service
  • URL Interpretation

7) What is port scanning?

Port scanning is used to determine which ports on a network are open and could be receiving or sending data. Port scanning is also a process for sending packets to specific ports on a host to analyze the response to identify vulnerabilities.

8) What are the three components of information security?

The three components of information security are known as CIA, C-Confidentiality, I- Integrity, and A- Availability.

9) What is a Firewall?

A firewall is the first line of defense in network security that is used to monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

10) What is MITM attack?

MITM attack or man-in-the-middle attack is an attack done by an attacker to intercept communication between the two parties in order to observe or manipulate the information by manipulating the traffic.

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

01st
May
MVC MCQ
01st
Jun
Devops  Mcq