Branch Wise MCQComputer Science McqsCyber Security 100+ MCQ & Answer Cyber Security | page-05 | Computer Course MCQ And Answer January 28, 2025 DSN MARATHI 41. Which of the following statements is true about the VPN in Network security? A. It is a type of device that helps to ensure that communication between a device and a network is secure. B. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer) C. It typically creates a secure, encrypted virtual “tunnel” over the open internet D. All of the above Answer Option : D 42. Which of the following type of text is transformed with the help of a cipher algorithm? A. Transformed text B. Complex text C. Scalar text D. Plain text Answer Option : D 43. The term “CHAP” stands for __________ A. Circuit Hardware Authentication Protocols B. Challenge Hardware Authentication Protocols C. Challenge Handshake Authentication Protocols D. Circuit Handshake Authentication Protocols Answer Option : C 44. Which type of the following malware does not replicate or clone them self’s through infection? A. Rootkits B. Trojans C. Worms D. Viruses Answer Option : B 45. Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers. A. RATs B. Worms C. Rootkits D. Botnets Answer Option : A 46. Which of the following statements is true about the Trojans? A. Trojans perform tasks for which they are designed or programmed B. Trojans replicates them self’s or clone them self’s through an infections C. Trojans do nothing harmful to the user’s computer systems D. None of the above Answer Option : A 47. Which of the following is just opposite to the Open Design principle? A. Security through obscurity B. Least common mechanism C. Least privileges D. Work factor Answer Option : A 48. Which of the following is a type of independent malicious program that never required any host program? A. Trojan Horse B. Worm C. Trap Door D. Virus Answer Option : B 49. Which of the following usually considered as the default port number of apache and several other web servers? A. 20 B. 40 C. 80 D. 87 Answer Option : C 50. DNS translates a Domain name into _________ A. Hex B. Binary C. IP D. URL Answer Option : D
41. Which of the following statements is true about the VPN in Network security? A. It is a type of device that helps to ensure that communication between a device and a network is secure. B. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer) C. It typically creates a secure, encrypted virtual “tunnel” over the open internet D. All of the above Answer Option : D
42. Which of the following type of text is transformed with the help of a cipher algorithm? A. Transformed text B. Complex text C. Scalar text D. Plain text Answer Option : D
43. The term “CHAP” stands for __________ A. Circuit Hardware Authentication Protocols B. Challenge Hardware Authentication Protocols C. Challenge Handshake Authentication Protocols D. Circuit Handshake Authentication Protocols Answer Option : C
44. Which type of the following malware does not replicate or clone them self’s through infection? A. Rootkits B. Trojans C. Worms D. Viruses Answer Option : B
45. Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers. A. RATs B. Worms C. Rootkits D. Botnets Answer Option : A
46. Which of the following statements is true about the Trojans? A. Trojans perform tasks for which they are designed or programmed B. Trojans replicates them self’s or clone them self’s through an infections C. Trojans do nothing harmful to the user’s computer systems D. None of the above Answer Option : A
47. Which of the following is just opposite to the Open Design principle? A. Security through obscurity B. Least common mechanism C. Least privileges D. Work factor Answer Option : A
48. Which of the following is a type of independent malicious program that never required any host program? A. Trojan Horse B. Worm C. Trap Door D. Virus Answer Option : B
49. Which of the following usually considered as the default port number of apache and several other web servers? A. 20 B. 40 C. 80 D. 87 Answer Option : C