Top 150+ Solved Information and Network Security MCQ Questions Answer

From 1 to 15 of 106

Q. An algorithm in encryption is called _____________.

a. Algorithm

b. Procedure

c. Cipher

d. Module

  • c. Cipher

Q. The information that gets transformed in encryption is ____________.

a. Plain text

b. Parallel text

c. Encrypted text

d. Decrypted text

  • a. Plain text

Q. A (n) ______ algorithm transforms ciphertext to plaintext.

a. Encryption

b. Decryption

c. Either (a) or (b)

d. Neither (a) nor (b)

  • b. Decryption

Q. The ________ is the message after transformation.

a. Ciphertext

b. Plaintext

c. Secret-text

d. None of the above

  • a. Ciphertext

Q. Which of the following is not a type of virus?

a. Boot sector

b. Polymorphi

c. C Multipartite

d. Troj

  • a. Boot sector

Q. _______________ infects the master boot record and it is challenging and a complex task toremove this virus.

a. Boot Sector Virus

b. Polymorphi

c. C Multipartite

d. Troj

  • a. Boot Sector Virus

Q. ______________ infects the executable as well as the boot sectors.

a. Non-resident virus

b. Boot Sector Virus

c. Polymorphic Virus

d. Multipartite Virus

  • d. Multipartite Virus

Q. Trojan creators do not look for _______________.

a. Deleting Data

b. Protecting Data

c. Modifying Data

d. Copying Data

  • b. Protecting Data

Q. Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.

a. Virus, Cyber-Criminals

b. Malware, Penetration Testers

c. Trojans, Cyber-Criminals

d. Virus, Penetration Testers

  • c. Trojans, Cyber-Criminals

Q. The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.

a. Phishing attack

b. DoS attack

c. Website attack

d. MiTM attack

  • b. DoS attack

Q. Trojan creators do not look for _______________.

a. Credit card information

b. Confidential data

c. Important documents

d. Securing systems with such programs

  • d. Securing systems with such programs
Subscribe Now

Get All Updates & News