Technologies Of Cyber Security Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rsabillon
R
Rsabillon
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,016
Questions: 10 | Attempts: 3,016

SettingsSettingsSettings
Technologies Of Cyber Security Quiz - Quiz

The Internet is a vast place, therefore it is essential to take security measures to protect important data. Take this " Technologies Of Cyber Security Quiz " to find out now how much you know about the various steps taken to prevent the computer from malicious attacks. Let's see how well you perform! Pick the right option to get a good score. Compare your scores with your friends for fun yet informational time! Good Luck!


Questions and Answers
  • 1. 

    Clear screen means that computers are to remain locked when you move away from your deskClear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true because it states that when you move away from your desk, the computer screen should be cleared to ensure that it remains locked and inaccessible to unauthorized individuals. Additionally, it states that confidential documents should be stored under lock and key, preventing unauthorized access. Both of these measures are important for maintaining security and protecting sensitive information.

    Rate this question:

  • 2. 

    Which of the following are the examples of Cyber security? 

    • A.

      Network Security 

    • B.

      Cloud Security

    • C.

      Application Security

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The examples given, network security, cloud security, and application security, all fall under the umbrella of cyber security. Network security involves protecting the integrity and confidentiality of a network and its data. Cloud security focuses on protecting data stored in cloud environments and preventing unauthorized access. Application security involves securing software applications and preventing vulnerabilities that could be exploited by attackers. Therefore, all of these examples are valid instances of cyber security measures.

    Rate this question:

  • 3. 

    You have a hard copy of a customer design document that you want to dispose off. What would you do

    • A.

      Throw it in any dust bin

    • B.

      Shred it using a shredder

    • C.

      Give it to the office boy to reuse it for other purposes

    • D.

      Be environment friendly and reuse it for writing

    Correct Answer
    B. Shred it using a shredder
    Explanation
    If a document is confidential or restricted, you need to dispose it off by shredding.
    The environmental guidelines for reusing paper specifies that only non confidential paper should be reused.

    Rate this question:

  • 4. 

    Does the security have the right to ask you to display your ID badges and check your bags?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    The security has the right to ask individuals to display their ID badges and check their bags as a measure to ensure safety and security. This practice is commonly implemented in various public places, such as airports, government buildings, and large events, to prevent unauthorized access, potential threats, and illegal activities. By verifying identification and inspecting bags, the security can maintain a secure environment and protect the well-being of everyone present.

    Rate this question:

  • 5. 

    What is the difference between a restricted and confidential document?

    • A.

      Restricted - to be shared among named individuals Confidential - to be shared with friends and family

    • B.

      Restricted - to be shared among an authorized group Confidential - to be shared among named individuals

    • C.

      Restricted - to be shared among named individuals Confidential - to be shared across the organization only

    Correct Answer
    A. Restricted - to be shared among named individuals Confidential - to be shared with friends and family
    Explanation
    The correct answer is "Restricted - to be shared among named individuals Confidential - to be shared with friends and family." This answer accurately defines the difference between a restricted and confidential document. A restricted document is meant to be shared only among specific individuals who are named or authorized to access it. On the other hand, a confidential document can be shared with friends and family, indicating a broader scope of sharing permissions beyond just named individuals.

    Rate this question:

  • 6. 

    After receiving an email from an unknown contact that has an attachment, you should

    • A.

      Open the attachment

    • B.

      Forward the attachment to your colleagues and friends

    • C.

      Delete the mail without opening it

    • D.

      Do nothing and keep it in the in-box

    Correct Answer
    C. Delete the mail without opening it
    Explanation
    When receiving an email from an unknown contact with an attachment, it is important to prioritize caution and security. Opening the attachment can potentially expose your device to viruses, malware, or other harmful content. Forwarding the attachment to colleagues and friends without knowing its content can inadvertently spread any potential threats. Deleting the email without opening it is the safest course of action to avoid any potential risks. Keeping the email in the inbox without taking any action leaves the possibility of accidentally opening the attachment, which is not recommended.

    Rate this question:

  • 7. 

    Which of the following can be used to restrict browser-based hacking? 

    • A.

      Anti spyware

    • B.

      Remote browser access

    • C.

      Anti virus

    • D.

      Incognito mode

    Correct Answer
    B. Remote browser access
    Explanation
    Remote browser access can be used to restrict browser-based hacking by allowing users to access and browse the internet through a remote server or virtual machine. This helps to protect the user's local machine from potential threats and attacks, as any malicious activity or malware encountered during browsing is contained within the remote environment. Additionally, remote browser access often includes additional security features such as encryption and authentication, further enhancing protection against hacking attempts.

    Rate this question:

  • 8. 

    Which of the following programs detect viruses in the computer system? 

    • A.

      Anti malware 

    • B.

      Anti virus

    • C.

      Spyware

    • D.

      Fire wall

    Correct Answer
    B. Anti virus
    Explanation
    Anti virus programs are specifically designed to detect and remove viruses from a computer system. These programs scan files and programs for known patterns or signatures of viruses, as well as behavior that may indicate the presence of a virus. They also often include real-time protection, which actively monitors the system for any suspicious activity or attempts by viruses to infect the system. Anti malware programs, on the other hand, are more general and can detect and remove a wider range of malicious software, including viruses, spyware, adware, and other types of malware.

    Rate this question:

  • 9. 

    In wi-fi security, which security protocol is mostly used? 

    • A.

      WPA2

    • B.

      WPS

    • C.

      WPA

    • D.

      None of the above

    Correct Answer
    A. WPA2
    Explanation
    WPA2 is the most commonly used security protocol in Wi-Fi networks. It provides a higher level of security compared to WPA and WPS. WPA2 uses the Advanced Encryption Standard (AES) algorithm, which is more secure than the Temporal Key Integrity Protocol (TKIP) used by WPA. WPA2 also supports stronger authentication methods, such as 802.1X, which enhances the overall security of the network. Therefore, WPA2 is the preferred choice for securing Wi-Fi networks.

    Rate this question:

  • 10. 

    Which of the following is a privately encrypted search engine? 

    • A.

      Google

    • B.

      Yahoo

    • C.

      Bing

    • D.

      Duckduckgo

    Correct Answer
    D. Duckduckgo
    Explanation
    Duckduckgo is a privately encrypted search engine, meaning it prioritizes user privacy by not tracking or storing personal information. Unlike Google, Yahoo, and Bing, Duckduckgo does not collect user data or create personalized search results. It aims to provide unbiased search results while protecting user privacy, making it a popular choice for those concerned about online tracking and data collection.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 05, 2015
    Quiz Created by
    Rsabillon
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.