0% found this document useful (0 votes)
16 views13 pages

Mid 2 Objective

This document is a question bank for the Cyber Security course at Malla Reddy Engineering College, covering various topics related to cybersecurity, mobile computing, and data privacy. It includes multiple-choice questions across different modules, focusing on key concepts, terminologies, and historical events in the field. The questions are designed to assess students' understanding and knowledge in cybersecurity and related areas.

Uploaded by

pitiw99769
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views13 pages

Mid 2 Objective

This document is a question bank for the Cyber Security course at Malla Reddy Engineering College, covering various topics related to cybersecurity, mobile computing, and data privacy. It includes multiple-choice questions across different modules, focusing on key concepts, terminologies, and historical events in the field. The questions are designed to assess students' understanding and knowledge in cybersecurity and related areas.

Uploaded by

pitiw99769
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MALLA REDDY ENGINEERING COLLEGE (AUTONOMOUS)

IV B. Tech I Semester (MR 20) II Mid Question Bank (Objective)


Subject: Cyber Security (A6217) Branch: CS, IOT & CSE
Name of the Faculty: Ms.K.DEVIKA
S.
Questions Ans
NO.
Module-III
1 Which of the following is an example of registry settings for mobile devices?
a.Microsoft ActiveSync
b.Macrosoft ActiveSync
c.Microsoft PassiveSync
d.MacrosoftPassiveSync
2 Identify the correct full form of PCs?
a.Problematic Computers
b.Personal Computers
c.Prototype Computers
d.Programmable Computers
3 How many types of components are there in mobile computing?
a.Four
b.Three
c.Two
d.One
4 WAP is stands for?
a.Wired Application Protocol
b.Wired Action Protocol
c.Wireless Action Protocol
d.Wireless Application Protocol
5 VPN is stands for?
a.Virtual Private Network
b.Virtual Privacy Network
c.Vital Private Network
d.Vital Privacy Network
6 MAC is stands for?
a.Medium Access Control
b.Media Access Control
c.Multiple Access Control
d.Minimum Access Control
7 Identify the Mobile OS in the following?
a.iOS
b.Android
c.Windows Phone
d.All
8 The most common types of malicious mobile apps are?
a.Worms
b.Botnets
c.Trojans
d.Adware
9 Mobile ransomware is a particular type of?
a.Mobile Malware
b.Mobile OS
c.Mobile Hardware
d.Mobile Device
10 Phishing email carries a malicious?
a.Link
b.Attachment
c.Malware
d.All
11 Malware can send through?
a.Email
b.SMS
c.Social Media
d.All
12 Intercepting network communications can be done using?
a.Phishing
b.MitM
c.Malware
d.DoS
13 HTTPS is stands for?
a.Hyper Text Transfer Protocol Secure
b.Hyper Transfer Text Protocol Secure
c.Hypo Text Transfer Protocol Secure
d.Hypo Transfer Text Protocol Secure
14 HTTP is stands for?
a.Hyper Text Transfer Protocol
b.Hyper Text Transmission Protocol
c.Hypo Text Transfer Protocol
d.Hypo Text Transmission Protocol
15 Jailbreaking and Rooting are terms for gaining administrator?
a.Amount
b.Access
c.Answer
d.All
16 USB is stands for?
a.Unique Series Bus
b.Unique Serial Bus
c.Universal Serial Bus
d.Universal Series Bus
17 SSN is stands for?
a.Social Service Number
b.Social Scale Number
c.Social Solution Number
d.Social Security Number
18 Biometrics techniques can be used for?
a.Authentication
b.Practice
c.Operation
d.Eliminate
19 LAN is stands for?
a.Last Area Network
b.Local Area Network
c.Latest Area Network
d.Loose Area Network
20 WAN is stands for?
a.Wireless Area Network
b.Wired Area Network
c.Wide Area Network
d.Window Area Network
21 PDP is stands for?
a.Police development process
b.Policy development process
c.Political development process
d.Primary development process
22 GPRS is stands for?
a.General Packet Radio System
b.General Pocket Radio Service
c.General Packet Radio Service
d.None of the above
23 SIP is stands for?
a.System Initiation Protocol
b.Several Initiation Protocol
c.Session Initiation Protocol
d.Security Initiation Protocol
24 VoIP is stands for?
a.Vocabulary Internet Protocol
b.Voice Over Internet Protocol
c.Vocational Internet Protocol
Voice On Internet Protocol
25 CLEW is stands for?
a.Closed-loop environment on wireless
b.Closed-loop environment to wireless
c.Closed-loop environment over wireless
d.Closed-loop environment for wireless
Module-IV
26 Pretexting is also known as?
a.Social Engineering
b.Computer Engineering
c.Mechanical Engineering
d.Process Engineering
27 Heartland Payment System Fraud is an example of?
a.Outsider Attack
b.Insider Attack
c.Inside Attack
d.Outside Attack
28 BCBS is stands for?
a.Blue Color Blue Shark
b.Blue Class Blue Science
c.Blue Cross Blue Shield
d.Blue Card Blue System
29 Blue Cross Blue Shield is an example of?
a.Inside Attack
b.Outside Attack
c.Outsider Attack
d.Insider Attack
30 In which year Blue Cross Blue Shield was happened?
a.2009
b.2008
c.2007
d.2006
31 BPO is stands for?
a.Business Point Outsourcing
b.Business Process Outsourcing
c.Big Point Outsourcing
d.Big Process Outsourcing
32 IPR is stands for?
a.Internet Property Rights
b.Interest Property Rights
c.Intellectual Property Rights
d.Inside Property Rights
33 Average days taken to resolve web-based attacks?
a.16 days
b.17 days
c.18 days
d.19 days
34 PDA is stands for?
a.Personal Digital Assistant
b.Private Digital Assistant
c.Privacy Digital Assistant
d.Permanent Digital Assistant
35 BSI is stands for?
a.Big Size Information
b.Business Sensitive Information
c.Big Stage Information
d.Business Stock Information
36 RFID is stands for?
a.Radio Fiber Indication
b.Radio Frequency Indication
c.Radio Frequency Identification
d.Radio Fiber Identification
37 How many security and privacy implications are there?
a.Zero
b.One
c.Two
d.Three
38 Which of the following is a security and privacy implications sphere?
a.User sphere
b.Recipient sphere
c.Joint sphere
d.All
39 B2B is stands for?
a.Business-to-Business
b.Business-through-Business
c.Business-two-Business
d.Business-too-Business
40 CRM is stands for?
a.Customer Reaction Management
b.Customer Relationship Management
c.Customer Representation Management
d.Customer Respect Management
41 ROI is stands for?
a.Rate On Investment
b.Rate Over Investment
c.Return On Investment
d.Return Over Investment
42 Which of the following are the elements of social computing?
a.Blogs
b.Wikis
c.RSS
d.All
43 Blogs are the part of?
a.Social Computing
b.Social Commerce
c.Social Community
d.Social Computer
44 Intellectual Property simply refers to?
a.Greatness of the mind
b.Creation of the mind
c.Wideness of the mind
d.None of the above
45 The term ‘Intellectual Property’ covers?
a.Copyrights
b.Trademarks
c.Both a and b
d.None of the above
46 Identify the correct Intellectual Property in the following?
a.Patents
b.Trademarks
c.Copyrights
d.All
47 Industrial Designs are type of?
a.Intellectual Property
b.Internet Protocol
c.Intellectual Protocol
d.Internet Property
48 Intellectual property is a part of?
a.Criminal Law
b.Property Law
c.Civil Law
d.Private Law
49 The Indian Trademark Act was started in the year of?
a.1997
b.1998
c.1999
d.2000
50 The Indian Copyright Act was started in the year of?
a.1954
b.1955
c.1956
d.1957
51 First computer crime was happened in?
a.1950
b.1951
c.1952
d.1953
52 First “Salami” technique-based attack happened in?
a.1959
b.1960
c.1961
d.1962
53 Primitive attacks were started in?
a.1968
b.1969
c.1970
d.1971
54 Attacks to obtain (illegal) access to computer is called as?
a.Primary Attacks
b.Pre-Attacks
c.Post Attacks
d.Primitive Attacks
55 Remote password attacks were started in?
a.1980
b.1981
c.1982
d.1983
56 First occurrence of “social engineering” attacks ware registered in?
a.1979
b.1980
c.1981
d.1982
57 First virus was released in?
a.1988
b.1989
c.1990
d.1991
58 First worm was created in?
a.1987
b.1988
c.1989
d.1990
59 First international espionage occurred in?
a.1990
b.1991
c.1992
d.1993
60 First buffer overflow attack was happened in?
a.1989
b.1990
c.1991
d.1992
61 First IP Spoofing occurred in?
a.1999
b.2000
c.2001
d.2002
62 First DDoS attack was happened in?
a.1998
b.1999
c.2000
d.2001
63 Sniffer attacks are started in?
a.1997
b.1998
c.1999
d.2000
64 DNS cache poisoning attacks were started in the year of?
a.2000
b.2001
c.2002
d.2003
65 Attacks on root DNS servers were started in?
a.1999
b.2000
c.2001
d.2002
66 At present what attacks are happening?
a.Wireless attacks
b.Browser attacks
c.Both
d.None of the above
67 Which of the following is not correct according to Organization’s Internal Costs?
a.Cost of detection
b.Cost of containment
c.Cost of recovery
d.Cost of currency
68 Wikipedia is an example of?
a.Wikis
b.Blogs
c.Vlogs
d.Media
69 Which of the following is an example of video sharing application?
a.Facebook
b.YouTube
c.Instagram
d.Snapchat
70 Which of the following is not an example of photo sharing application?
a.Flickr
b.Instagram
c.YouTube
d.Snapchat
71 Which of the following is not an example of collaborative tools?
a.Zimbre
b.Zoho
c.Google
d.Facebook
72 LinkedIn is a?
a.Business networking tool
b.Video sharing tool
c.Collaborative tool
d.Social networking tool
73 Kyte is an example of?
a.Audio sharing
b.Video sharing
c.Photo sharing
d.Blogs
74 Reddit is an example of?
a.Wikis
b.Blogs
c.Social bookmarking
d.Social networking
75 Google is an example of?
a.Business networking
b.Social networking
c.Social bookmarking
d.Collaborative tools
Module-V
76 GDPR is stands for?
a.General Data Protection Regulation
b.General Damage Protection Regulation
c.General Data Privacy Regulation
d.General Damage Privacy Regulation
77 Which of the following is not a challenge of data privacy?
a.Online tracking
b.Malware
c.Social media
d. Cybercrime
78 Lack of transparency is a challenge of?
a.Data protection
b.Data procedure
c.Data privacy
d.Data profiling
79 Identify the data privacy challenge in this?
a.Data breaches
b.Insider threats
c.Losing control of data
d.All
80 The process of collecting information from different sources is called as?
a.Data Linking
b.Data Profiling
c.Data Privacy
d.Data Breach
81 The process of examining, analyzing and creating useful summaries of data is called as?
a.Data Linking
b.Data Profiling
c.Data Privacy
d.Data Breach
82 A privacy policy is a?
a.Proper document
b.Illegal document
c.Legal document
d.Improper document
83 A privacy policy is a legal document in?
a.Public law
b.Private law
c.Protection law
d.Privacy law
84 Short form of “eXtensible Access Control Markup Language” is?
a.XACML
b.EACML
c.EXACML
d.XTACML
85 PPL stands for?
a.PreLife Policy Language
b.PrimeLife Policy Language
c.PrivacyLife Policy Language
d.PreviousLife Policy Language
86 A-PPL stands for?
a.Accounts PrimeLife Policy Language
b.Accounting PrimeLife Policy Language
c.Accountability PrimeLife Policy Language
d.Account PrimeLife Policy Language
87 Short form of “Geospatial eXtensible Access Control Markup Language” is?
a.GXACML
b.GeXACML
c.GoXACML
d.GeoXACML
88 XACL is stands for?
a.XML Access Control Language
b.XM Access Control Language
c.XL Access Control Language
d.ML Access Control Language
89 Short form of “Adaptable and Programmable Policy Environment and Language” is?
a.ADPPEL
b.APPEL
c.APPELA
d.APPENL
90 P2U stands for?
a.Purpose-too-Use Policy Language
b.Purpose-two-Used Policy Language
c.Purpose-to-Use Policy Language
d.Purpose-to-Used Policy Language
91 Short form of “Enterprise Privacy Authorization Language” is?
a.ENPAL
b.EPAUL
c.EPALA
d.EPAL
92 Short form of “Customer Profile Exchange Language” is?
a.CPExchange
b.CPRExchange
c.CUPExchange
d.CPExchangeL
93 PSLang is stands for?
a.Policies Specification Language
b.Policy Specification Language
c.Police Specification Language
d.Polity Specification Language
94 SAML is stands for?
a.Security Assertion Markdown Language
b.Security Assertion Mark Language
c.Security Assertion Markup Language
d.Security Assertion Marks Language
95 PRML is stands for?
a.Private Rights Markup Language
b.Previous Rights Markup Language
c.Precaution Rights Markup Language
d.Privacy Rights Markup Language
96 USDL is stands for?
a.Unified Service Description Language
b.Unisize Service Description Language
c.UniSee Service Description Language
d.Unicode Service Description Language
97 Which of the following is not a privacy policy language?
a.PPL
b.HTML
c.USDL
d.EPAL
98 P2U is a?
a.Private Policy Language
b.Promotion Policy Language
c.Privacy Policy Language
d.Public Policy Language
99 Identify the privacy policy language in the following?
a.XACML
b.XACL
c.GeoXACML
d.All
100 Customer Profile Exchange Language is a?
a. Privacy Policy Language
b.Private Policy Language
c.Promotion Policy Language
d.Public Policy Language
101 EMR is stands for?
a.Electric Medical Records
b.Electronic Medical Records
c.Electrical Medical Records
d.Electronical Medical Records
102 Short form of “Patient Care Management Systems” is?
a.PMCS
b.PCSM
c.PCMS
d.PCSM
103 Short form of “Family Educational Rights and Privacy Act” is?
a.FREPA
b.FERAP
c.FEPRA
d.FERPA
104 Short form of “Health Insurance Portability and Accountability Act” is?
a.HIPAA
b.HPIAA
c.IHPAA
d.HIAPA
105 Health Insurance Portability and Accountability Act is started in?
a.1995
b.1996
c.1997
d.1998
106 Official Website of Maharashtra Government Hacked was hacked in?
a.2005
b.2006
c.2007
d.2008
107 Official Website of Maharashtra Government Hacked by what hacker group?
a.Cooledhacker
b.Coldhacker
c.Coolinghacker
d.Coolhacker
108 CEIB is stands for?
a.Central Economic Intelligence Bureau
b.Central Economics Intelligence Bureau
c.Central Economical Intelligence Bureau
d.Central Economy Intelligence Bureau
109 What is the full form of CBI?
a.Central Bureau on Investigation
b.Central Bureau of Investigation
c.Central Bureau off Investigation
d.Central Bureau over Investigation
110 Short form of “Society for Worldwide Interbank Financial Telecommunications” is?
a.SFWIFT
b.SWIFTE
c.SWIFT
d.SWINFT
111 CII is stands for?
a.Conference of Indian Industry
b.Confederate of Indian Industry
c.Confederating of Indian Industry
d.Confederation of Indian Industry
112 BPRD is stands for?
a.Bureau of Police Research and Development
b.Bureau of Police Research and Developments
c.Bureau off Police Research and Development
d.Bureau on Police Research and Development
113 The Indian parliament attack was happened in which year?
a.2000
b.2001
c.2002
d.2003
114 ATM full form is?
a.Automatic Teller Machine
b.Automate Teller Machine
c.Automated Teller Machine
d.Any Time Money
115 Pune City Police Burst Nigerian Racket in the year?
a.2018
b.2019
c.2020
d.2021
116 BKC is stands for?
a.Bandra-Kurla Complex
b.Bandra-Korla Complex
c.Bandra-Koorla Complex
d.Bandra-Kurlla Complex
117 CFO is stands for?
a.Cheep Financial Officers
b.Chief Financial Officers
c.Cheap Financial Officers
d.Chef Financial Officers
118 MNC is stands for?
a.Multinational Company
b.Multination Corporation
c.Multinational Corporation
d.Multination Company
119 Who is the CEO of Flipkart?
a.Azim Premji
b.Satyanarayana
c.Sundar Pichai
d.Binny Bansal
120 CEO is stands for?
a.Chief Executive Officer
b.Chief Executive Officer
c.Chief Executive Officer
d.Chief Executive Officer
121 NGO is stands for?
a.Non-government organization
b.Non-governmental organization
c.No-governmental organization
d.None-governmental organization
122 Short form of “Maharashtra Intellectual property Crime Unit” is?
a.MPCUI
b.MICUP
c.MIPCU
d.MIPUC
123 Cybercriminals use “Screen Overlay attack” to commit?
a.Social Frauds
b.Economical Frauds
c.Health Frauds
d.Financial Frauds
124 UPI is stands for?
a.Unified Payments Interface
b.Unifresh Payments Interface
c.Unifeature Payments Interface
d.Unifeed Payments Interface
125 SIM is stands for?
a.Subscriber Identification Module
b.Subscriber Identity Module
c.Subscriber Identity Modules
d.Subscriber Identification Modules

Prepared By Name:

Signature: HOD Signature

You might also like