Information Security MCQ

Information Security MCQ

  • Sharad Jaiswal
  • 22nd Nov, 2021

We have listed here the best Information Security MCQ Questions for your basic knowledge of Information Security. This Information Security MCQ Test contains 25+ Information Security Multiple Choice Questions. You have to select the right answer to every question to check your final preparation for Information Security MCQ Interview, Exam or Placement Drives.

Practice Best Information Security MCQ Questions

1) Firewalls are to protect against?

  • A. Fire Attacks
  • B.Virus Attacks
  • C.Data Driven Attacks
  • D.Unauthorized Attacks

2) What was the name of first Virus program Robert Thomas created?

  • A. PARAM
  • B.Creeper
  • D.The famous

3) VIRUS stands for

  • A. Very Intelligent Result Until Source
  • B.Viral Important Record User Searched
  • C.Very Interchanged Resource Under Search
  • D.Vital Information Resource Under Slege

4) What was the name of first antivirus software?

  • A. reaper
  • C.ray Tomlinson
  • D.tinkered

5) Which of these is a part of network identification?

  • A. UserID
  • B.Password
  • C.OTP
  • D.Fingerprint

6) The first PC virus was developed in

  • A. 1980
  • B.1986
  • C.1988
  • D.1999

7) Which of the following is known as Malicious software?

  • A. malware
  • B.illegalware
  • C.badware
  • D.maliciousware

8) __________mode is used whenever either end of a security association is gateway.

  • A. Gateway
  • B.Transport
  • C.Tunnel
  • D.Encapsulating

9) Self-repeating and do not require a computer program to attach themselves.

  • A. Worms
  • B.virus
  • C.Spyware
  • D.Ransomware

10) PKI stands for_______

  • A. Public Key Infrastructure
  • B.Public Kinetic Infrastructure
  • C.Private Key Infrastructure
  • D.Proxy Key Infrastructure

11) Man-in-the-middle(MitM) attack are

  • A. IP spoofing
  • B.Session hijacking
  • C.Eavesdropping attacks
  • D.All of the above

12) Why would a hacker use a proxy server?

  • A. To Create A Ghost Server On The Network
  • B.To Hide Malicious Activity On The Network
  • C.To Create A Stronger Connection With The Target
  • D.To Hide A Remote Access Connection

13) Phishing is a form of______

  • A. login credentials and credit card numbers
  • B.fraudulent attempt
  • scam
  • D.All of the above

14) The first phase of hacking is

  • A. Availability
  • B.Authentication
  • C.output
  • D.Information gathering

15) Important activity in system hacking?

  • A. Analysis
  • B.Information Gathering
  • C.Cracking Passwords
  • D.Heavy equipments

16) The first phase of hacking an it system is compromise of which foundation of security?

  • A. Integrity
  • B.Availability
  • C.Confidentiality
  • D.Authentication

17) What is the most important activity in system hacking?

  • A. Covering Tracks
  • B.Escalating Privileges
  • C.Cracking Passwords
  • D.Information Gathering

18) Performing hacking activities with the intent on gaining visibility for an unfair situation is called ..........

  • A. Analysis
  • B.Cracking
  • C.Hacktivism
  • D.Exploitation

19) To hide information in a picture what technology is used?

  • A. Rootkits
  • B.Bitmapping
  • C.Steganography
  • D.None of the above

20) Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?

  • A. The Network Architecture
  • B.The System Configuration
  • C.The Education Of The Attacker
  • D.The Business Strategy Of The Company

21) What Tool Can Be Used To Perform SNMP Enumeration?

  • A. Whois
  • B.Nslookup
  • C.DNSlookup
  • D.IP Network Browser

22) Keyloggers Are A Form Of

  • A. Trojan
  • B.Spyware
  • C.Shoulder Surfing
  • D.Social Engineering

23) What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide Information?

  • A. Kernel Level Rootkits
  • B.System Level Rootkits
  • C.Library Level Rootkits
  • D.Application Level Rootkits

24) Enumeration is part of what phase of ethical hacking?

  • A. Scanning
  • B.Gaining Access
  • C.Reconnaissance
  • D.Maintaining Access

25) Which of the following is an independent malicious program that need not any host program?

  • A. Virus
  • B.Worm
  • C.Trojan horse
  • D.Trap doors

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.