

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? |
A. | 1978 |
B. | 1980 |
C. | 1982 |
D. | 1984 |
Answer» B. 1980 | |
2. |
Who coined the term “cyberspace”? |
A. | Andrew Tannenbaum |
B. | Scott Fahlman |
C. | William Gibson |
D. | Richard Stallman |
Answer» D. Richard Stallman | |
3. |
Name the hacker who breaks the ARPANET systems? |
A. | Jon von Neumann |
B. | Kevin Poulsen |
C. | Kevin Mitnick |
D. | John Draper |
Answer» C. Kevin Mitnick | |
4. |
Who was the first individual who performed a major hacking in the year 1971? |
A. | Steve Wozniak |
B. | Steve Jobs |
C. | Kevin Mitnick |
D. | John Draper |
Answer» E. | |
5. |
What is the name of the first hacker’s conference? |
A. | DEFCON |
B. | OSCON |
C. | DEVCON |
D. | SECCON |
Answer» B. OSCON | |
6. |
From where the term ‘hacker’ first came to existence? |
A. | MIT |
B. | Stanford University |
C. | California |
D. | Bell’s Lab |
Answer» B. Stanford University | |
7. |
WHO_WAS_THE_FIRST_INDIVIDUAL_WHO_PERFORMED_A_MAJOR_HACKING_IN_THE_YEAR_1971??$ |
A. | Steve Wozniak |
B. | Steve Jobs |
C. | Kevin Mitnick |
D. | John Draper |
Answer» E. | |
8. |
Who coined the term “cyberspace”?$# |
A. | Andrew Tannenbaum |
B. | Scott Fahlman |
C. | William Gibson |
D. | Richard Stallman |
Answer» D. Richard Stallman | |
9. |
Name_the_hacker_who_breaks_the_ARPANET_systems?$ |
A. | Jon von Neumann |
B. | Kevin Poulsen |
C. | Kevin Mitnick |
D. | John Draper |
Answer» C. Kevin Mitnick | |
10. |
_____ is a powerful encryption tool released by Philip Zimmerman in the year 1991. |
A. | PGP (Protected Good Privacy) |
B. | AES (Advanced Encryption Standard) |
C. | PGP (Pretty Good Privacy) |
D. | DES (Data Encryption Standard) |
Answer» D. DES (Data Encryption Standard) | |
11. |
Who was the first individual to distribute computer worms through internet? |
A. | Vladimir Levin |
B. | Bill Landreth |
C. | Richard Stallman |
D. | Robert T. Morris |
Answer» E. | |
12. |
In which year the Computer Fraud & Abuse Act was adopted in the United States? |
A. | 1983 |
B. | 1984 |
C. | 1987 |
D. | 1988 |
Answer» C. 1987 | |
13. |
In_which_year_computer_scientists_try_to_integrate_encryption_technique_in_TCP/IP_protocol? |
A. | 1978 |
B. | 1980 |
C. | 1982 |
D. | 1984 |
Answer» B. 1980 | |
14. |
In which year, hacking became a practical crime and a matter of concern in the field of technology? |
A. | 1971 |
B. | 1973 |
C. | 1970 |
D. | 1974 |
Answer» D. 1974 | |
15. |
In which year, first practical technology hacking came into origin? |
A. | 1878 |
B. | 1890 |
C. | 1895 |
D. | 1876 |
Answer» B. 1890 | |
16. |
_______ is the oldest phone hacking techniques used by hackers to make free calls |
A. | Phishing |
B. | Spamming |
C. | Phreaking |
D. | Cracking |
Answer» D. Cracking | |
17. |
What is the name of the first hacker’s conference?$ |
A. | DEFCON |
B. | OSCON |
C. | DEVCON |
D. | SECCON |
Answer» B. OSCON | |
18. |
In which year the first popular hacker conference took place? |
A. | 1994 |
B. | 1995 |
C. | 1993 |
D. | 1992 |
Answer» D. 1992 | |
19. |
What is the one thing that old hackers were fond of or find interests in? |
A. | Breaking Other’s system |
B. | Voracious thirst for knowledge |
C. | Cracking Phone calls |
D. | Learning new languages |
Answer» C. Cracking Phone calls | |
20. |
From where the term ‘hacker’ first came to existence?$ |
A. | MIT |
B. | Stanford University |
C. | California |
D. | Bell’s Lab |
Answer» B. Stanford University | |
21. |
In which year the term hacking was coined? |
A. | 1965-67 |
B. | 1955-60 |
C. | 1970-80 |
D. | 1980-82 |
Answer» C. 1970-80 | |