CYBER SAFETY QUIZ 23 AUGUST
MULTIPLE CHOICE QUESTIONS
UNIT 1: INTRODUCTION TO CYBER SECURITY
1) "IoT" stand for in the context
of cybersecurity ……..
[a] Internet of Things [b] Input-Output Technology [c]
Information Overload Toolkit [d]
International Online Tracking
2. VPN (Virtual
Private Network) primarily
provide ………….
[a]
Firewall protection [b] Anonymity on the internet
[c] Enhanced download speed [d] Video streaming
services
3. The primary
purpose of a firewall in cybersecurity ………
[a]
Protecting against physical
break-ins [b]Monitoring web traffic
[c] Encrypting data transmissions [d] Filtering and controlling network
traffic
4. The term for the practice of sending fraudulent emails to deceive
individuals into revealing
personal information ……….
[a]
Malware [b] Hacking
[c] Social engineering [d]
Encryption
5. What is cyberspace? ………..
[a]
A physical location
[b]
A virtual environment created by interconnected computers
[c]
An alternate reality [d] A fictional concept
6. The primary
purpose of a VPN (Virtual
Private Network) ……..
[a]
To play online
games [b] To secure and anonymize internet connections
[c] To access outer space [d] To send physical
mail
7. The term for the deliberate spreading of false information
online to deceive and
manipulate people ……..
[a]
Cyberwarfare [b] Cyberbullying
[c] Disinformation [d] Cyber
espionage
8. The "URL" stand for in the context of web addresses
………
[a]
Uniform Resource
Locator [b] Universal Resource Language
[c] Unidentified Real-time Link [d] Universal Remote Location
9. The common cybersecurity threat
in cyberspace ……..
[a]
Solar flares [b] Hurricanes
[c] Malware [d] Earthquakes
10. The "ISP" stand for in the context
of internet services
………..
[a]
Internet Security Protocol [b] Internet Speed Provider
[c] Internet
Service Provider [d] Internet Search
Platform
11. The protocol
is commonly used for sending
emails in cyberspace ………
[a]
HTTP (Hypertext Transfer
Protocol) [b] SMTP (Simple Mail Transfer Protocol)
[c] VPN (Virtual Private
Network) [d] FTP (File Transfer
Protocol)
12. The primary
goal of cybersecurity in cyberspace ……….
[a]
To facilitate online
shopping
[b]
To eliminate all online risks
[c]
To protect digital
information and systems
from threats
[d]
To increase social
media engagement
13. HTML stand for in web technology ………….
[a]
Hyperlink Text Markup
Language [b]
Hypertext Transfer Protocol
[c] Hypertext Markup Language [d] High-Tech Multimedia
Language
14. The programming language is primarily used for client-side scripting in web Development ……..
[a]
Python [b] Java
[c] JavaScript [d] PHP
15. The role of a web server
in the context of web technology ………
[a]
Rendering web pages in
browsers [b] Storing user data on the internet
[c] Hosting
and serving web content to
clients [d] Protecting against viruses and malware
16. The technology allows for real-time, bidirectional communication between a web server and a client browser ………
[a]
HTML [b] CSS
[c] AJAX (Asynchronous JavaScript and XML) [d] WebSockets
17. The primary
function of a web browser
………..
[a]
To create websites [b] To host websites
[c] To access and display web content [d] To manage database
systems
18. The protocol
is commonly used for secure data transmission over the internet
………
[a]
HTTP [b] HTTPS
[c] FTP [d] SMTP
19. The main purpose of an IP address in internet communication ……..
[a]
To specify a website's designed
m
[b]
To identify the physical location
of a server
[c]
To uniquely identify
devices on a network
[d]
To encrypt data transmissions
20. The internet
protocol is used for sending
and receiving emails
………
[a]
HTTP [b] FTP
[c] SMTP [d] DNS
21. The term for the practice of obtaining
sensitive information, such as passwords or credit card numbers, by disguising as a trustworthy entity
in an electronic communication ……….
[a]
Hacking [b] Encryption
[c] Phishing [d] Spamming
22. The internet
browser is developed by the Mozilla
Foundation ……..
[a]
Chrome [b] Safari
[c] Firefox [d] Edge
23. The technology is commonly used to create
and format web documents ………..
[a]
TCP/IP [b] HTML (Hypertext Markup
Language)
[c] VPN (Virtual Private
Network) [d]
JavaScript
24. The primary
purpose of a web browser
………
[a]
To host websites [b] To send emails
[c] To access and display web content [d] To manage computer
files
25. The term for
a clickable link on a web page that takes to another web page or resource
…………
[a]
Web marker [b] Hyperlink
[c] Web token [d] Internet
shortcut
26. When was the first
successful message sent over ARPANET,
the precursor to the
modern internet ……….
[a]
1960 [b] 1969 [c] 1975 [d] 1985
27. The technology was used to create the first web browser, called
"World Wide Web
……..
[a]
Mosaic [b] Netscape
Navigator
[c] Lynx [d]HTML (Hypertext Markup Language)
28. The term for the practice of connecting
different computer networks
to form the internet
[a]
Internetworking [b] Intranetworking
[c] Interconnecting [d] Intriguing
29. The primary
purpose of the original ARPANET,
the precursor to the internet
…….
[a]
To support military
communication during wartime
[b]
To provide free public internet
access
[c]
To enable global
e-commerce
[d]
To serve as a platform
for social networking
30. The organization is responsible for managing the allocation of IP addresses
and domain names on the Internet ………
[a]
ICANN [b] UNESCO
[c] WHO [d] NSA
UNIT 2: CYBER CRIME AND CYBER LAW
1. What is cybercrime? …………
[a] A form of virtual
reality gaming
[b] Illegal activities conducted over the internet
[c] A type of computer
hardware
[d] Online etiquette guidelines
2. Which of the following
is an example of a cybercrime? ………
[a] Playing online video games [b] Sending
emails to friends
[c] Hacking
into someone's bank
account [d] Posting
photos on social
media
3. The term for a cybercrime in which
criminals use deceptive
emails or websites
to trick individuals into
revealing personal information …………..
[a] Phishing [b] Spamming
[c] Hacking [d] Viral marketing
4. The cybercrime involves illegally copying
and distributing copyrighted digital material, such as music or movies …………
[a] Hacking [b] Phishing
[c] Cyberbullying [d] Digital piracy
5. What is a "botnet" in the context of cybercrime? ……….
[a] A type of computer
virus
[b] A network of infected
computers controlled by a remote attacker
[c]
A secure online
shopping website
[d] A social media platform
6. Which of the following is a form of cybercrime that involves harassing, threatening, or targeting individuals online? ………
[a] Hacking [b] Digital piracy
[c] Cyberbullying [d] Phishing
7. The primary
motive behind cyber extortion, a common form of cybercrime ………..
[a] Gaining notoriety [b] Seeking revenge
[c] Financial gain [d] Political
activism
8. The term for a cybercrime that involves spreading
false information about someone
with the intent to harm their reputation ……..
[a] Cyberstalking [b]
Cyberbullying
[c] Cyberdefamation [d] Cyber hacking
9. The cyber law primarily deal with ……….
[a] Laws related to outer space
[b] Legal issues involving computer
networks and the internet
[c]
Environmental regulations
[d] Criminal law
10. The primary goal of cyber law ……….
[a]
To prevent all forms of online communication
[b] To regulate social media usage
[c]
To establish legal
guidelines for internet-related activities
[d] To promote online anonymity
11. The area of cyber
law deals with intellectual property
rights, copyright infringement,
and digital piracy ………
[a] Cybersecurity law [b] Information technology law
[c] Cybercrime law [d] Intellectual property law
12. Type of cybercrime involves
unauthorized access to computer systems
or networks with the intent
to steal, alter, or destroy data
………..
[a] Cyberbullying [b]
Hacking
[c] Online
fraud [d] Phishing
13. The primary
objective of cybercrimes categorized as "financial cybercrimes" ………
[a] Spreading malware [b] Gaining unauthorized access
to systems
[c] Financial gain or theft [d] Cyberbullying
14. The term for cybercrimes that involve spreading
false or misleading information with the intent to damage a person's reputation or
credibility ………
[a] Online fraud [b] Cyberbullying
[c] Defamation [d] Hacking
15. The Type of cybercrime involves distributing malicious
software that can damage or compromise computer systems or data
…….
[a] Hacking [b] Phishing
[c] Malware distribution [d] Identity theft
16. The term for cybercrimes that target critical
infrastructure systems, such as power
grids, water supplies, or transportation networks? ………..
[a] Cyberbullying [b]
Cyberterrorism
[c] Online fraud [d] Phishing
17. What is financial fraud?
……….
[a]
Legal financial transactions
[b] Unintentional financial errors
[c] Intentional deceptive practices for financial
gain
[d] Financial assistance for those in
need
18. Which type of financial
fraud involves creating
fake financial documents or records to deceive
others for financial gain? ………..
[a] Identity theft [b] Money laundering
[c] Forgery [d] Tax evasion
19. Which type of financial fraud involves intentionally providing false or misleading information on tax returns to
reduce tax liability? …………
[a] Tax evasion [b] Tax compliance
[c] Tax transparency [d] Tax credits
20. What is "malware"?
[a]
A type of computer hardware
[b] A form of online
shopping
[c] Malicious software
designed to harm or infiltrate computer systems
[d] A computer programming language
21. Which type of malware
disguises itself as legitimate software
but contains malicious code that can harm your
computer or steal your data? …………
[a] Virus [b]
Worm
[c] Trojan Horse [d] Spyware
22. What is "ransomware"? ……….
[a]
Malware that records
your keystrokes
[b] A type of online shopping
platform
[c] Malware that encrypts your files and demands a ransom for their release
[d] A type of antivirus software
23. The remedial
measures in cybersecurity primarily focused on ……….
[a] Preventing future
cyberattacks
[b] Detecting ongoing
cyberattacks
[c]
Responding to and recovering from cyberattacks
[d] Promoting ethical
hacking
Comments
Post a Comment