Explore topic-wise MCQs in Cyber Security.

This section includes 4 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

The threat of backdoors started when ____________ & ____________ OSs became widely accepted.

A. single-user, Windows
B. multiuser, networked
C. single-user, UNIX
D. multiuser, UNIX
Answer» C. single-user, UNIX
2.

A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system s hardware.

A. crypter
B. virus
C. backdoor
D. key-logger
Answer» D. key-logger
3.

_____________ can modify data on your system so that your system doesn t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.

A. IM Trojans
B. Backdoor Trojans
C. Trojan-Downloader
D. Ransom Trojan
Answer» E.
4.

A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

A. IM Trojans
B. Backdoor Trojans
C. Trojan-Downloader
D. Ransom Trojan
Answer» B. Backdoor Trojans