Top 150+ Solved Information and Network Security MCQ Questions Answer
Q. An algorithm in encryption is called _____________.
a. Algorithm
b. Procedure
c. Cipher
d. Module
Q. The information that gets transformed in encryption is ____________.
a. Plain text
b. Parallel text
c. Encrypted text
d. Decrypted text
Q. In brute force attack, on average half of all possible keys must be tried to achievesuccess.
a. True
b. False
c. none
d. all
Q. A (n) ______ algorithm transforms ciphertext to plaintext.
a. Encryption
b. Decryption
c. Either (a) or (b)
d. Neither (a) nor (b)
Q. The ________ is the message after transformation.
a. Ciphertext
b. Plaintext
c. Secret-text
d. None of the above
Q. Which of the following is not a type of virus?
a. Boot sector
b. Polymorphi
c. C Multipartite
d. Troj
Q. A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.
a. Program
b. Virus
c. Application
d. Worm
Q. _______________ infects the master boot record and it is challenging and a complex task toremove this virus.
a. Boot Sector Virus
b. Polymorphi
c. C Multipartite
d. Troj
Q. ______________ infects the executable as well as the boot sectors.
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Q. Trojan creators do not look for _______________.
a. Deleting Data
b. Protecting Data
c. Modifying Data
d. Copying Data
Q. Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.
a. Virus, Cyber-Criminals
b. Malware, Penetration Testers
c. Trojans, Cyber-Criminals
d. Virus, Penetration Testers
Q. During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.
a. Network
b. System
c. Website
d. Router
Q. The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.
a. Phishing attack
b. DoS attack
c. Website attack
d. MiTM attack
Q. In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.
a. URL Redirection
b. DOS
c. Phishing
d. MiTM attack
Q. Trojan creators do not look for _______________.
a. Credit card information
b. Confidential data
c. Important documents
d. Securing systems with such programs