🚀 Hurry! Offer Ends In
00 Days
00 Hours
00 Mins
00 Secs
Enroll Now
X

MCQs on Cyber Security

Ques 51

MPESB-2023

इंटरनेट से जुड़े सिस्टम के हार्डवेयर, सॉफ्टवेयर और डेटा पर साइबर हमलों की रोकथाम को ______कहा जाता है

The prevention of cyber attacks on internet-connected systems' hardware, software, and data is referred to as ?

[A] Cyber crime

[B] Cyber Security

[C] Cyber bullying

[D] Identity theft

Correct Answer : Cyber Security


Ques 52

MPESB-2023

निम्नलिखित में से कौन-सा साइबर सुरक्षा का लाभ नहीं है?

Which of the following is not an advantage of cyber security?

[A] Makes the system slower

[B] Minimizes computer freezing and crashes

[C] Gives privacy to users

[D] Protects system against viruses

Correct Answer : Makes the system slower


Ques 53

MPESB -2023

साइबर सुरक्षा द्वारा क्या संरक्षित है?

What is protected by cyber security?

[A] Hackers are protected by cyber security

[B] Criminals are protected by cyber security

[C] Internet-connected systems are protected

[D] Protects system against viruses

Correct Answer : Internet-connected systems are protected


Ques 54

DSSSB TGT -2023

साइबर सुरक्षा में कानून क्या उपाय प्रदान करता है?

In cyber security, what remedy does the law provide ?

[A] Apology

[B] Imprisonment

[C] Technologies

[D] Computer networks

Correct Answer : Imprisonment


Ques 55

MP-Patwari-2017

कंप्यूटर सुरक्षा में __________ का अर्थ है कि कंप्यूटर सिस्टम सहायक को केवल अधिकृत पक्षों द्वारा ही संशोधित किया जा सकता है।

In computer security __________means that computer system assists can be modifies only by authorizes parties .

[A] Confident

[B] Integrity

[C] Availability

[D] Authenticity

Correct Answer : Integrity


Ques 56

DPC-2023

वे दो चीजें क्या हैं जो एक व्हाइट हैट हैकर को ब्लैक हैट हैकर से अलग करती हैं?

What are two things that differentiate a white hat from a black hat hacker?

[A] Hacking expertise and legality issues

[B] Hacking expertise and the intention behind hacking

[C] Intention behind hacking and legality issues

[D] Hacking expertise and permission to hack

Correct Answer : Intention behind hacking and legality issues


Ques 57

DPC-2023

‘व्हाइट हैट हैकर’ कौन है?

Who is a ‘white hat hacker’?

[A] Who uses his skills to identify security loopholes

[B] Who can bypass security to get into a system

[C] Who wears a white hat

[D] A person from old western movies

Correct Answer : Who uses his skills to identify security loopholes


Ques 58

DPC-2023

Which of these is not true of ethical hacking?

Which of these is not true of ethical hacking?

[A] Hack with the knowledge of the owner

[B] Hack for personal gains

[C] Test a computer security system

[D] . Identify weak and vulnerable sections

Correct Answer : Hack for personal gains


Ques 59

DPC-2023

हैकर किसे कहा जा सकता है?

Who can be called a hacker?

[A] Someone who legally breaks into a system

[B] Someone who are employed to help in securing computer systems

[C] Someone who writes financial and personal data from a computer

[D] Someone who can break into a system bypassing security measures

Correct Answer : Someone who can break into a system bypassing security measures


Ques 60

EPFO SSA 2023

कंप्यूटर नेटवर्क सुरक्षा के संदर्भ में उन कथनों को पहचानें जो गलत हैं।

Identify the statements which are FALSE in the context of computer network security.

[A] Cyber bullying is a form of harassment or bullying inflicted through the use of internet .

[B] Cyber trolling is an internet slang for a person who intestinally starts argument or upsets others by posting inflammatory remarks .

[C] Email spoofing means sending malicious and bad application and files through direct messaging , email or websites etc , in order to get access to users a personal data .

[D] Worm is a program that when run , will attempt to install a regular virus onto users hard disk.

Correct Answer : Email spoofing means sending malicious and bad application and files through direct messaging , email or websites etc , in order to get access to users a personal data .


Ques 61

UPPCL TGT -2023

साइबर सुरक्षा के संबंध में निम्नलिखित में से कौन-सा कथन गलत है?

Which of the following statements regarding Cyber ​​Security is incorrect?

[A] Cyber ​​safety and security has become an urgent issue.

[B] Cyber ​​security is executed using malware, viruses, trojans, botnets and social engineering.

[C] Cyber ​​is no longer limited to just security, it is now also linked to social economics.

[D] It focuses on protecting and defending computer systems, networks, and our digital lives from disruption.

Correct Answer : Cyber ​​security is executed using malware, viruses, trojans, botnets and social engineering.


Ques 62

[IBPS Clerk 2014]

लॉगिन नाम और पासवर्ड का सत्यापन के रूप में जाना जाता है

Verification of a login name and password is known as

[A] configuration

[B] accessibility

[C] authentication

[D] logging in

Correct Answer : authentication


Ques 63

[IBPS PO 2016]

यदि आप अपने नेटवर्क की सुरक्षा बनाए रखने के लिए क्रेडेंशियल के आधार पर किसी व्यक्ति को नेटवर्क पर अनुमति दे रहे हैं, तो यह अधिनियम उस प्रक्रिया को संदर्भित करता है

If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of

[A] Authentication

[B] Automation

[C] Firewall

[D] Encryption

Correct Answer : Authentication


Ques 64

[IBPS Clerk 2014]

वायरस, वर्म्स और ट्रोजन हॉर्स जैसे सॉफ़्टवेयर जिनमें दुर्भावनापूर्ण सामग्री होती है, उन्हें कहा जाता है

Software's such as Viruses, Worms and Trojan Horses that have a malicious content, is known as

[A] Malicious software (malware)

[B] adware

[C] scareware

[D] spyware

Correct Answer : Malicious software (malware)


Ques 65

[IBPS Clerk 2012]

वायरस, ट्रोजन हॉर्स और वर्म्स

Viruses, trojan horses and worms are

[A] able to harm computer system

[B] unable to detect if present on computer

[C] user-friendly applications

[D] harmless applications resident on computer

Correct Answer : able to harm computer system


Ques 66

[IBPS PO 2015]

......अक्सर मेल अटैचमेंट के माध्यम से पीसी पर डिलीवर किए जाते हैं और अक्सर नुकसान पहुंचाने के लिए डिज़ाइन किए जाते हैं।

…… are often delivered to a PC through an mail attachment and are often designed to do harm.

[A] Portals

[B] Spam

[C] Viruses

[D] Other than those given as option

Correct Answer : Viruses


Ques 67

[RBI Grade B 2012]]

आपके कंप्यूटर पर मौजूद डेटा को नष्ट करने के लिए डिज़ाइन किया गया प्रोग्राम जो अन्य कंप्यूटरों को 'संक्रमित' कर सकता है, उसे कहा जाता है

A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a

[A] disease

[B] torpedo

[C] hurricane

[D] virus

Correct Answer : virus


Ques 68

[SBI Clerk 2012]

यदि आपका कंप्यूटर खुद को रीबूट कर रहा है तो यह संभव है कि

If your computer rebooting itself then it is likely that

[A] it has a virus

[B] it does not have enough memory

[C] there is no printer

[D] there has been a power surge

Correct Answer : it has a virus


Ques 69

[IBPS Clerk 2011]

कम्प्यूटर वायरस है

Computer virus is

[A] a hardware

[B] windows tool

[C] a computer program

[D] a system software

Correct Answer : a computer program


Ques 70

[IBPS Clerk 2011]

किसी खतरे का ........ सिस्टम पर उसके संभावित प्रभाव को मापता है

The ......... of a threat measures its potential impact on a system

[A] vulnerabilities

[B] counter measures

[C] degree of harm

[D] susceptibility

Correct Answer : degree of harm


Ques 71

[IBPS PO 2015]

एक कंप्यूटर वायरस आम तौर पर खुद को किसी अन्य कंप्यूटर प्रोग्राम से जोड़ता है जिसे

A computer virus normally attaches itself to another computer program known as a

[A] host program

[B] target program

[C] backdoor program

[D] bluetooth

Correct Answer : host program


Ques 72

[IBPS RRB PO 2018]

उपयोगकर्ता होने का दिखावा करके उपयोगकर्ता के सिस्टम या जानकारी तक अनधिकृत पहुँच प्राप्त करने का प्रयास?

Attempt to gain unauthorized access to a user’s system or information by pretending to be the user?

[A] Spoofing

[B] Hacker

[C] Cracker

[D] Phishing

Correct Answer : Phishing


Ques 73

[IBPS Clerk 2014]

निम्न में से कौन सा यह निर्धारित करने में सक्षम बनाता है कि कोई उपयोगकर्ता किसी वेबसाइट पर कितनी बार गया है?

Which of the following enables to determine how often a user visited a Website?

[A] Hacker

[B] Spammer

[C] Phish

[D] Cookie

Correct Answer : Cookie


Ques 74

[Allahabad Bank PO 2011]

एक व्यक्ति जो अपनी विशेषज्ञता का उपयोग अन्य लोगों के कंप्यूटर तक पहुँच प्राप्त करने के लिए अवैध रूप से जानकारी प्राप्त करने या नुकसान पहुँचाने के लिए करता है, वह एक अपराधी है।

A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a

[A] spammer

[B] hacker

[C] instant messenger

[D] All of these

Correct Answer : hacker


Ques 75

[IBPS Clerk 2014]

उस व्यक्ति को क्या कहा जाता है जो कंप्यूटर का उपयोग लोगों को नुकसान पहुँचाने या महत्वपूर्ण प्रणालियों को नष्ट करने के लिए करता है?

What is a person called who uses a computer to cause harm to people or destroy critical systems?

[A] Cyber Terrorist

[B] Black-hat-Hacker

[C] Cyber Cracker

[D] Hacktivist

Correct Answer : Cyber Terrorist


Ques 76

[IBPS PO 2011, IBPS Clerk 2013]

........ व्यक्तियों द्वारा अपनी पहचान गलत बताकर आपसे गोपनीय जानकारी प्राप्त करने का प्रयास है

........ are attempts by individuals to obtain confidential information from you by falsifying their identity

[A] Phishing trips

[B] Computer viruses

[C] Spyware scams

[D] Phishing scams

Correct Answer : Phishing scams


Ques 77

[IBPS Clerk 2010]

निम्नलिखित में से कौन सी आपराधिक गतिविधि है जिसमें इलेक्ट्रॉनिक संचार में किसी भरोसेमंद व्यक्ति या व्यवसाय का भेष बदलकर पासवर्ड, क्रेडिट कार्ड, डेबिट जैसी संवेदनशील जानकारी हासिल करने का प्रयास किया जाता है?

Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication?

[A] Spoofing

[B] Phishing

[C] Stalking

[D] Hacking

Correct Answer : Phishing


Ques 78

[SBI PO 2011, IBPS Clerk 2014]

निम्नलिखित सभी वास्तविक सुरक्षा और गोपनीयता जोखिमों के उदाहरण हैं सिवाय

All of the following are examples of real-security and privacy risks except

[A] hackers

[B] spam

[C] viruses

[D] identify theft

Correct Answer : spam


Ques 79

[SBI Clerk 2011]

डिजिटल हस्ताक्षर एक

A digital signature is an

[A] scanned signature

[B] signature in binary form

[C] encrypting information

[D] handwritten signature

Correct Answer : encrypting information


Ques 80

[Allahabad Bank PO 2011]

विक्रेता द्वारा बनाए गए प्रोग्राम संशोधनों को कहा जाता है

Vendor created program modifications are called

[A] patches

[B] antiviruses

[C] hales

[D] fixes

Correct Answer : patches


Ques 81

[SBI PO 2011]

निम्न में से कौन सा कंप्यूटर की मेमोरी है, लेकिन वायरस के विपरीत, यह खुद की प्रतिलिपि नहीं बनाता है?

Which of the following a computer’s memory, but unlike a virus, it does not replicate itself ?

[A] Trojan horse

[B] Logic bomb

[C] Cracker

[D] Firewall

Correct Answer : Trojan horse


Ques 82

[RBI Grade B 2012]

विशिष्ट प्रतिबंधों के आधार पर सॉफ़्टवेयर का उपयोग करने का कानूनी अधिकार एक के माध्यम से दिया जाता है

The legal right to use software based on specific restrictions is granted via a

[A] software privacy policy

[B] software license

[C] software password manager

[D] software log

Correct Answer : software license


Ques 83

[IBPS Clerk 2014]

……… सॉफ्टवेयर की अनधिकृत नकल और वितरण को संदर्भित करता है

……… refers to the unauthorized copying and distribution of software

[A] Hacking

[B] Software piracy

[C] Software literacy

[D] Cracking

Correct Answer : Software piracy


Ques 84

KVS Junior Secretariat Assistant

निम्नलिखित में से कौन लोकप्रिय एंटीवायरस का उदाहरण है?

Which of the following is an example of popular antivirus?

[A] Bitdefender

[B] Worms

[C] Sasser

[D] Encrypted virus

Correct Answer : Bitdefender


Ques 85

KVS Junior Secretariat Assistant

भारत में ई-कॉमर्स के लिए कानूनी बुनियादी ढांचा प्रदान करने वाला पहला साइबर कानून कौन सा है?

First cyberlaw which provides the legal infrastructure for e-commerce in India is

[A] The Information Technology Act, 1996

[B] The Information Technology Act, 2000

[C] The Information Technology Act, 1998

[D] The Information Technology Act, 1990

Correct Answer : The Information Technology Act, 2000


Ques 86

KVS Junior Secretariat Assistant

डिजिटल हस्ताक्षर क्या है?

What is Digital Signature?

[A] Sender's Signature

[B] Unique Code

[C] Encrypted Signature

[D] None of the above

Correct Answer : Encrypted Signature


Ques 87

KVS Junior Secretariat Assistant

निम्नलिखित में से कौन सा मोबाइल फोन गेमिंग वायरस है?

Which among the following is a mobile phone gaming virus?

[A] Trojan Horse

[B] Creeper

[C] Brain

[D] None of the above

Correct Answer : Trojan Horse


Ques 88

KVS Junior Secretariat Assistant

साइबर सुरक्षा का दायरा है

The scope of cyber security is

[A] Vulnerability reduction

[B] Incident response

[C] Recovery polic

[D] All of the above

Correct Answer : All of the above


Ques 89

RRB-NTPC-2020

निम्नलिखित में से कौन सा एक इस समूह से संबंधित नहीं है

Which one of the following does not belong to this group

[A] Malware

[B] Phishing

[C] Ransomware

[D] Spam

Correct Answer : Ransomware


Ques 90

SSC Scientific Assistant CS_IT NOV -2017

निम्नलिखित में से सामान्य सुरक्षा खतरे क्या हैं?

Among the following the common security threats are?

[A] File Shredding

[B] File sharing and permission

[C] File corrupting

[D] File integrity

Correct Answer : File sharing and permission


Ques 91

SSC Scientific Assistant CS_IT NOV -2017

निम्नलिखित में से कौन सी वायरस की विशेषता नहीं है?

Which of the following is not a characteristic of virus?

[A] Virus destroy and modify user dat

[B] Virus is a standalone program

[C] Virus is a code embedded in a legitimate program

[D] Virus cannot be detected

Correct Answer : Virus cannot be detected


Ques 92

NVS Junior Secretariat Assis(LDC)-2019

निम्नलिखित में से कौन सा सॉफ्टवेयर, कंप्यूटर सिस्टम की सुरक्षा से संबंधित होता है?

Which of the following software is related to the security of computer systems?

[A] Adware

[B] Spreadsheet

[C] Word processor

[D] Antivirus

Correct Answer : Antivirus


Ques 93

NVS Junior Secretariat Assistant-2022

भारतीय आईटी अधिनियम, 2000 के कौन से अध्याय साइबर अपीलीय न्यायाधिकरण की स्थापना को अनिवार्य बनाते हैं?

Which Chapters of the Indian IT Act, 2000 mandates the establishment of Cyber Appellate Tribunal?

[A] Chapter V

[B] Chapter X

[C] Chapter IX

[D] Chapter VII

Correct Answer : Chapter X


Ques 94

Tech Assistant -2019

निम्नलिखित में से कौन सा दुर्भावनापूर्ण प्रोग्राम बिना किसी मानवीय हस्तक्षेप के स्वयं फैल सकता है?

Which of the following malicious program can spread by itself without any human intervention ?

[A] Worm

[B] Trojan

[C] Spyware

[D] Virus

Correct Answer : Worm


Ques 95

Technical Assistant-2024

फ़िशिंग क्या है?

What is phishing ?

[A] Introducing into another person's computer by breaking the password

[B] Sending emails to users which appear to be legitimate

[C] Denial of service

[D] Illegaly decoding encrypted message

Correct Answer : Sending emails to users which appear to be legitimate


Latest Updates