100+ MCQ & Answer Cyber Security | page-04 | Computer Course MCQ And Answer
31. Which of the following statements is correct about the firewall? A. It is a device installed at the boundary
Read More31. Which of the following statements is correct about the firewall? A. It is a device installed at the boundary
Read More41. Which of the following statements is true about the VPN in Network security? A. It is a type of
Read More51. Which one of the following systems cannot be considered as an example of the operating systems? A. Windows 8
Read More61. ______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. A.
Read More71. Data ___________ is used to ensure confidentiality. A. Encryption B. Locking C. Decryption D. Backup Answer Option : A
Read More81. A asymmetric-key (or public key ) cipher uses A. 1 key B. 2 key C. 3 key D. 4
Read More91. ECC stands for A. Elliptic curve cryptography B. Enhanced curve cryptography C. Elliptic cone cryptography D. Eclipse curve cryptography
Read MoreIntroduction to computer, Introduction to GUI Based Operating System, Elements of Word Processing, Spreadsheets, Introduction to Internet, WWW and web
Read More01. Which of the following have the smallest storage capacity ? A. Zip disk. B. Hard disk. C. Floppy disk.
Read More11. The most common type of storage devices are … A. Persistent. B. Optical. C. Magnetic. D. Flash. Answer Option
Read More