{"id":17948,"date":"2025-11-11T04:24:13","date_gmt":"2025-11-11T04:24:13","guid":{"rendered":"https:\/\/mcqsadda.com\/?p=17948"},"modified":"2026-01-05T04:27:33","modified_gmt":"2026-01-05T04:27:33","slug":"computer-security-100-mcqs-with-answer-and-explanation","status":"publish","type":"post","link":"https:\/\/mcqsadda.com\/index.php\/2025\/11\/11\/computer-security-100-mcqs-with-answer-and-explanation\/","title":{"rendered":"Computer Security 100 MCQs With Answer and Explanation"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">1. Computer security is mainly concerned with  ________.<\/mark><\/strong><br>A) Protecting software from errors<br>B) Protecting data and systems from unauthorized access<br>C) Improving hardware performance<br>D) Reducing power consumption<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Computer security ensures confidentiality, integrity, and availability of data and systems.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">2. The term \u201ccybersecurity\u201d refers to _________.<br><\/mark><\/strong>A) Hardware repair<br>B) Protection of Internet-connected systems<br>C) Software installation<br>D) Data compression<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Cybersecurity protects networks, computers, programs, and data from digital attacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">3. Which of the following is an example of malware?<br><\/mark><\/strong>A) Antivirus<br>B) Trojan horse<br>C) Firewall<br>D) Backup software<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Malware like Trojan horses can damage systems or steal data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">4. A program that hides inside another program and performs malicious actions is called<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><br><\/mark><\/strong>A) Virus<br>B) Worm<br>C) Trojan horse<br>D) Spyware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Trojan horse disguises itself as legitimate software to deceive users.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">5. Which malware spreads automatically without human intervention?<br><\/mark><\/strong>A) Trojan horse<br>B) Worm<br>C) Virus<br>D) Spyware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Worms self-replicate and spread across networks without needing to attach to files.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">6. A program that infects other programs and spreads when the infected program is executed is called<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Virus<br>B) Worm<br>C) Trojan horse<br>D) Spyware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Viruses attach to files and require execution to propagate.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">7. Ransomware is malware that<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><br><\/mark><\/strong>A) Deletes all files<br>B) Encrypts files and demands payment for decryption<br>C) Slows down computer performance<br>D) Displays pop-up ads<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Ransomware locks users out of their data until a ransom is paid.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">8. Spyware is<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><br><\/mark><\/strong>A) A protective software<br>B) Software that monitors user activities secretly<br>C) Cloud storage service<br>D) Internet browser<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Spyware tracks browsing habits, passwords, or keystrokes without user consent.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">9. Adware primarily<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Deletes files<br>B) Displays unwanted advertisements<br>C) Encrypts data<br>D) Monitors network traffic<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Adware generates revenue by showing ads, often without user permission.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">10. Which of the following is used to detect and remove malware?<\/mark><\/strong><br>A) Firewall<br>B) Antivirus software<br>C) Cloud storage<br>D) Proxy server<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Antivirus software scans, detects, and removes malicious programs.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">11. A firewall is used to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Protect a network from unauthorized access<br>B) Increase Internet speed<br>C) Encrypt files<br>D) Store data online<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Firewalls filter traffic and prevent malicious access to networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">12. A strong password should include<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Only lowercase letters<br>B) Letters, numbers, and special characters<br>C) Only numbers<br>D) Only uppercase letters<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Strong passwords resist guessing and brute-force attacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">13. Two-factor authentication (2FA) enhances security by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Using two passwords<br>B) Requiring a password and a second factor like OTP<br>C) Encrypting emails<br>D) Blocking malware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  2FA adds an extra layer of security to login processes.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">14. Phishing attacks are primarily aimed at<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Damaging hardware<br>B) Stealing sensitive information like passwords<br>C) Increasing bandwidth<br>D) Slowing down computers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Phishing uses deceptive emails or websites to obtain confidential data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">15. A fake website that mimics a legitimate one to steal data is called<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Worm<br>B) Phishing site<br>C) Trojan horse<br>D) Ransomware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Phishing sites trick users into entering usernames, passwords, or financial info.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">16. Man-in-the-middle (MITM) attack involves<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypting files<br>B) Intercepting communication between two parties<br>C) Deleting files<br>D) Sending spam emails<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  MITM attackers can steal or manipulate transmitted data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">17. Which of the following encrypts data for secure communication?<\/mark><\/strong><br>A) SSL\/TLS<br>B) HTTP<br>C) FTP<br>D) SMTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Secure Socket Layer (SSL) and Transport Layer Security (TLS) encrypt web traffic.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">18. VPN stands for<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Virtual Private Network<br>B) Very Private Network<br>C) Virtual Protected Node<br>D) Verified Protocol Network<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  VPN encrypts data and provides secure Internet access over public networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">19. RDP (Remote Desktop Protocol) is used for<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Local file storage<br>B) Remote access to computers<br>C) Email transfer<br>D) Cloud backup<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  RDP allows users to control a remote computer over a network.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">20. DDoS attacks aim to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Steal passwords<br>B) Overwhelm a server with traffic, causing disruption<br>C) Encrypt files<br>D) Spy on users<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Distributed Denial of Service attacks use multiple systems to flood a target server.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">21. Social engineering attacks exploit<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Software vulnerabilities<br>B) Human psychology<br>C) Network routers<br>D) Firewalls<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Social engineering tricks users into giving confidential information or access.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">22. CAPTCHA is used to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypt files<br>B) Prevent automated bot submissions<br>C) Improve bandwidth<br>D) Protect hardware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  CAPTCHA ensures that online forms are submitted by humans, not bots.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">23. A digital certificate ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Identity verification and secure communication<br>B) Faster Internet<br>C) Malware removal<br>D) Cloud storage access<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Certificates use public key infrastructure (PKI) to authenticate websites and encrypt data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">24. Public key cryptography uses<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Single key for encryption and decryption<br>B) Two keys: public and private<br>C) Only passwords<br>D) Only symmetric keys<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Asymmetric cryptography uses a public key for encryption and a private key for decryption.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">25. A honeypot in cybersecurity refers to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) A malware removal tool<br>B) A decoy system to attract attackers<br>C) Cloud storage solution<br>D) Firewall configuration<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Honeypots trap attackers and analyze their behavior to improve security.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">26. Antivirus software primarily works by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><br><\/mark><\/strong>A) Encrypting data<br>B) Detecting, quarantining, and removing malware<br>C) Blocking network traffic<br>D) Storing data in the cloud<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   Antivirus programs scan for malicious code and prevent infections.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">27. Real-time protection in antivirus software means<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Scanning files only when executed<br>B) Continuous monitoring of the system for malware<br>C) Only updating virus definitions<br>D) Automatic backup<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Real-time scanning prevents malware from infecting the system as files are accessed.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">28. Which of the following is a common antivirus software?<\/mark><\/strong><br>A) Microsoft Word<br>B) Norton<br>C) Photoshop<br>D) Google Drive<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Norton is a widely used antivirus program for detecting and removing threats.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">29. A firewall can be<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Hardware only<br>B) Software only<br>C) Both hardware and software<br>D) Cloud service only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  Firewalls can be implemented as devices or software applications to monitor and filter traffic.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">30. A packet filtering firewall works at which layer of the OSI model?<br><\/mark><\/strong>A) Application<br>B) Transport<br>C) Network<br>D) Data Link<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  Packet filtering firewalls inspect IP packets at the network layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">31. Stateful inspection firewalls track<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Only packet headers<br>B) The state of active connections<br>C) Malware signatures<br>D) Encrypted traffic<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Stateful firewalls monitor connection state to allow or block traffic based on context.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">32. Which of the following is a common backup strategy?<\/mark><\/strong><br>A) Full backup<br>B) Incremental backup<br>C) Differential backup<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  Different backup types optimize storage, time, and recovery options.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>33. A full backup<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/strong><\/mark><br>A) Copies only changed files<br>B) Copies all selected files<br>C) Compresses data for storage<br>D) Encrypts files<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Full backup ensures a complete copy of all files for easy recovery.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">34. Incremental backup saves<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) All files every time<br>B) Only files changed since the last backup<br>C) Only system files<br>D) Only cloud files<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   Incremental backups are faster and require less storage space.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">35. Differential backup saves<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Only new files<br>B) All files changed since the last full backup<br>C) All system files<br>D) Cloud-based files only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Differential backup includes all changes since the last full backup.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">36. Data encryption ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Faster Internet<br>B) Confidentiality of information<br>C) Removal of viruses<br>D) Backup efficiency<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   Encryption converts data into unreadable form for unauthorized users.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">37. Which encryption type uses the same key for encryption and decryption?<br><\/mark><\/strong>A) Asymmetric<br>B) Symmetric<br>C) Hashing<br>D) Blockchain<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Symmetric encryption uses a single secret key for both encryption and decryption.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">38. Which encryption type uses a public key and a private key?<br><\/mark><\/strong>A) Symmetric<br>B) Asymmetric<br>C) Hashing<br>D) SSL only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Asymmetric (public key) cryptography uses a pair of keys for secure communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">39. Backup storage can be<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) External hard drives<br>B) Cloud storage<br>C) Network-attached storage<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  Backups can be maintained locally, on networks, or in the cloud.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">40. Which type of backup is fastest to restore?<\/mark><\/strong><br>A) Incremental<br>B) Full<br>C) Differential<br>D) Random<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Full backups contain all files, making restoration quicker than incremental or differential backups.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">41. Two-step verification improves security by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Using stronger passwords only<br>B) Requiring a password and a secondary factor<br>C) Encrypting files automatically<br>D) Blocking all emails<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  This reduces the risk of unauthorized access even if a password is compromised.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">42. Biometrics used for authentication include<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Fingerprints<br>B) Retina scan<br>C) Voice recognition<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  Biometric systems verify identity using unique physical traits.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">43. A security policy is<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) A set of rules to protect IT resources<br>B) Antivirus software<br>C) Firewall configuration only<br>D) Backup procedure<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Security policies guide users and IT staff on safe practices and access controls.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">44. Patch management ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Updating software to fix security vulnerabilities<br>B) Encrypting files<br>C) Creating backups<br>D) Increasing storage<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Regular patching reduces risk of exploitation through known vulnerabilities.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">45. Two types of firewalls are<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Packet filtering and proxy<br>B) Antivirus and spyware<br>C) Full and incremental<br>D) Hardware only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Firewalls can filter traffic at packet level or act as intermediaries (proxy).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">46. Endpoint security focuses on<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Servers only<br>B) Client devices like laptops and mobile phones<br>C) Cloud infrastructure only<br>D) Routers only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Endpoint security protects individual devices connecting to a network.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">47. Intrusion Detection System (IDS) is used to <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypt data<br>B) Monitor network for suspicious activities<br>C) Backup files<br>D) Block malware<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  IDS alerts administrators about possible security breaches.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">48. Intrusion Prevention System (IPS) differs from IDS by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Not detecting attacks<br>B) Actively blocking attacks<br>C) Slowing network traffic<br>D) Encrypting communications<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  IPS can prevent attacks in addition to detecting them.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">49. Cloud backup provides<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) On-site storage only<br>B) Remote storage accessible over Internet<br>C) Only incremental backup<br>D) Antivirus services<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   Cloud backups store data off-site, ensuring recovery in case of local data loss.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">50. Security awareness training helps<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Improve firewall settings<br>B) Educate users on safe computing practices<br>C) Encrypt emails<br>D) Create backups<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Training reduces risks from social engineering, phishing, and unsafe practices.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">51. Advanced Persistent Threat (APT) refers to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Temporary malware<br>B) Long-term, targeted cyberattack<br>C) Spam email attack<br>D) Denial-of-Service attack<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  APTs are sophisticated, persistent attacks aimed at stealing sensitive data over extended periods.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">52. Zero-day attack exploits<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Known vulnerabilities<br>B) Previously unknown vulnerabilities<br>C) Weak passwords<br>D) Network bandwidth<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Zero-day attacks exploit security flaws before developers release a patch.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">53. Keylogger is used to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypt files<br>B) Record keystrokes secretly<br>C) Block malware<br>D) Backup data<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Keyloggers capture typed data such as passwords and credit card numbers.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">54. Botnet refers to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) A single malware program<br>B) Network of compromised computers controlled remotely<br>C) Firewall software<br>D) Encryption tool<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Botnets can perform DDoS attacks, send spam, or mine cryptocurrency.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">55. SQL Injection attacks target<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Network hardware<br>B) Databases<br>C) Emails<br>D) Firewalls<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  SQL injection manipulates database queries to gain unauthorized access to data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">56. Cross-Site Scripting (XSS) attacks target<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Websites and users through malicious scripts<br>B) Email servers<br>C) Firewalls<br>D) Backup files<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  XSS injects scripts into web pages to steal cookies or perform malicious actions.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">57. Social engineering attacks primarily exploit<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Hardware flaws<br>B) Human behavior and trust<br>C) Encrypted communications<br>D) Cloud servers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Attackers manipulate users into revealing confidential information.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">58. Ethical hacking is<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Unauthorized hacking<br>B) Legal hacking to identify vulnerabilities<br>C) Malware development<br>D) Virus distribution<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Ethical hackers help organizations secure systems by finding and fixing weaknesses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">59. Penetration testing involves<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypting files<br>B) Simulating attacks to test security<br>C) Blocking malware<br>D) Creating backups<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Pen testing identifies security gaps by mimicking real attack scenarios.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">60. White-hat hackers are<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Malicious hackers<br>B) Ethical hackers who help improve security<br>C) Spyware developers<br>D) Script kiddies<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  White-hat hackers test systems legally to enhance security.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">61. Black-hat hackers are<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Ethical hackers<br>B) Malicious hackers breaking into systems illegally<br>C) Network administrators<br>D) Antivirus developers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Black-hat hackers exploit vulnerabilities for personal gain or damage.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">62. Gray-hat hackers are<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Always ethical<br>B) Hack without permission but without malicious intent<br>C) Cybersecurity professionals only<br>D) Botnet operators<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Gray-hat hackers may expose vulnerabilities publicly without causing harm.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">63. Ransomware-as-a-Service (RaaS) refers to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Free antivirus software<br>B) Subscription-based ransomware tools for attackers<br>C) Cloud storage service<br>D) Backup software<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  RaaS allows non-technical criminals to launch ransomware attacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">64. Phishing can be prevented by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Using strong passwords<br>B) Verifying sender identity before clicking links<br>C) Updating antivirus<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  Awareness, secure passwords, and antivirus help prevent phishing attacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">65. Spear phishing targets<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Random users<br>B) Specific individuals or organizations<br>C) Network routers<br>D) Firewalls<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Spear phishing is personalized, increasing the likelihood of success.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">66. Denial-of-Service (DoS) attacks aim to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypt data<br>B) Overwhelm systems to make services unavailable<br>C) Steal passwords<br>D) Update software<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  DoS attacks disrupt availability by exhausting resources.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">67. Distributed Denial-of-Service (DDoS) attacks use<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) A single computer<br>B) Multiple compromised systems<br>C) Only mobile devices<br>D) Only cloud servers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  DDoS floods targets with traffic from many devices simultaneously.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">68. Malware analysis is done to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Create malware<br>B) Understand and mitigate malware behavior<br>C) Encrypt data<br>D) Backup files<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Analyzing malware helps design detection and prevention strategies.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">69. Security Information and Event Management (SIEM) is used for<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Real-time monitoring and analysis of security events<br>B) Encrypting files<br>C) Backup management<br>D) Email filtering only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  SIEM collects and analyzes security data to detect threats proactively.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">70. Honeypots are<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Antivirus software<br>B) Decoy systems to lure attackers<br>C) Cloud storage<br>D) Network routers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Honeypots help study attack methods and improve security defenses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">71. Key management in cryptography involves<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Storing passwords only<br>B) Generating, distributing, and managing encryption keys securely<br>C) Encrypting emails<br>D) Firewall configuration<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Proper key management ensures data confidentiality and integrity.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">72. Patch management helps in<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Fixing software vulnerabilities<br>B) Creating backups<br>C) Encrypting data<br>D) Blocking spam<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Timely patching reduces exposure to cyberattacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">73. Cybercrime includes<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Identity theft<br>B) Financial fraud<br>C) Malware attacks<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  Cybercrime encompasses illegal activities conducted using digital technology.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">74. Ethical hackers use<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Unauthorized access techniques for malicious purposes<br>B) Hacking skills legally to secure systems<br>C) Malware development<br>D) Cloud storage<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Ethical hacking identifies and fixes security flaws with permission.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">75. Bug bounty programs<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Offer rewards for finding software vulnerabilities<br>B) Provide antivirus services<br>C) Backup data online<br>D) Block phishing emails<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Organizations incentivize ethical hackers to detect and report security issues.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">76. Cloud security ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Data stored in the cloud is protected from unauthorized access<br>B) Faster Internet<br>C) Malware removal on local systems only<br>D) Backup of physical devices<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Cloud security includes measures like encryption, access control, and monitoring to safeguard cloud data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">77. End-to-end encryption ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Data is readable by intermediaries<br>B) Only sender and receiver can read the data<br>C) Data is compressed<br>D) Data is backed up automatically<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  End-to-end encryption prevents third parties, including service providers, from accessing the content.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">78. Multi-factor authentication (MFA) requires<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Only a password<br>B) Multiple forms of verification<br>C) Only a security question<br>D) Only biometrics<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  MFA improves security by requiring two or more verification methods, e.g., password + OTP + biometric.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">79. Tokenization in security is used for<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Replacing sensitive data with non-sensitive tokens<br>B) Encrypting files with a password<br>C) Blocking malware<br>D) Storing files in cloud<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Tokenization reduces risk by replacing real data (like credit card numbers) with surrogate values.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">80. Blockchain technology enhances security by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Encrypting emails only<br>B) Providing immutable, decentralized records<br>C) Faster Internet<br>D) Data compression<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Blockchain ensures data integrity through a tamper-resistant, distributed ledger.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">81. IoT security focuses on<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Securing devices connected to the Internet<br>B) Encrypting cloud files only<br>C) Firewall for laptops only<br>D) Antivirus installation<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  IoT security protects smart devices like sensors, home appliances, and industrial equipment.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">82. Common IoT security risks include<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Device hijacking<br>B) Data leaks<br>C) Botnet attacks<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  IoT devices are vulnerable to various threats, requiring encryption, authentication, and firmware updates.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">83. Zero Trust Security model means<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Trust all devices inside a network<br>B) Never trust, always verify every access request<br>C) Encrypt only passwords<br>D) Only use cloud backup<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Zero Trust enforces strict identity verification and least-privilege access policies.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">84. AI in cybersecurity helps to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Predict and detect threats automatically<br>B) Encrypt files only<br>C) Backup data automatically<br>D) Install firewalls<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  AI and machine learning analyze patterns and detect anomalies to prevent attacks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">85. Security Information and Event Management (SIEM) systems provide<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Real-time monitoring and analysis of security alerts<br>B) Only data encryption<br>C) Malware removal<br>D) Cloud storage<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  SIEM systems collect logs, detect threats, and alert administrators proactively.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">86. Cloud Access Security Broker (CASB) is used for<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Monitoring cloud usage and enforcing security policies<br>B) Encrypting emails only<br>C) Backup management<br>D) Blocking viruses locally<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  CASBs provide visibility and control over data and threats in cloud services.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">87. Role-based access control (RBAC) allows<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Everyone to access all resources<br>B) Assigning permissions based on user roles<br>C) Encrypting all files automatically<br>D) Firewall configuration only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  RBAC ensures users can access only the resources necessary for their role.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">88. Security patches in cloud environments help to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Reduce security vulnerabilities<br>B) Encrypt files<br>C) Backup data<br>D) Block phishing emails<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Applying patches fixes known flaws, protecting against exploits.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">89. API security is important because<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) APIs transfer data between services and can be exploited if insecure<br>B) Only encrypts emails<br>C) Provides backup<br>D) Blocks malware on servers<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Securing APIs prevents data breaches and unauthorized access.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">90. Edge computing security ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Data is processed and secured near the source<br>B) All data stored only in cloud<br>C) Local antivirus installation<br>D) Firewall configuration only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Edge computing reduces latency and risk by securing data close to IoT devices.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">91. Distributed Ledger Technology (DLT) ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Centralized storage<br>B) Tamper-proof, decentralized record keeping<br>C) Data compression<br>D) Cloud backup<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   DLT like blockchain enhances integrity and transparency of digital records.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">92. Quantum cryptography provides<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Faster Internet<br>B) Encryption based on quantum mechanics principles<br>C) Cloud storage<br>D) Antivirus protection<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>   Quantum cryptography offers theoretically unbreakable encryption using quantum key distribution.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">93. Cloud-native security integrates<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Security into cloud applications from development stage<br>B) Only firewalls<br>C) Antivirus software only<br>D) Backup services only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Cloud-native security ensures security is part of design, deployment, and operation.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">94. Security orchestration, automation, and response (SOAR) systems<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Automate threat detection and response<br>B) Only encrypt files<br>C) Provide cloud storage<br>D) Only perform backups<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  SOAR integrates tools and processes to reduce response time to security incidents.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">95. Multi-cloud security deals with<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Security across multiple cloud service providers<br>B) Only on-premise networks<br>C) Local antivirus updates<br>D) Firewall monitoring<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Multi-cloud environments require policies and tools to secure diverse platforms.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">96. Firmware updates in IoT devices are important because<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) They improve battery life only<br>B) They fix security vulnerabilities and bugs<br>C) Only increase device speed<br>D) Backup device data<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  Regular firmware updates prevent exploitation of device vulnerabilities.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">97. Secure coding practices help to<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Prevent vulnerabilities during software development<br>B) Backup cloud data<br>C) Encrypt emails only<br>D) Monitor network traffic<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Writing secure code reduces risks of SQL injection, XSS, and other exploits.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">98. Cyber threat intelligence (CTI) provides<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Data about potential cyber threats for proactive defense<br>B) Antivirus scanning<br>C) Cloud backup<br>D) Network acceleration<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  CTI helps organizations prepare for, detect, and respond to threats.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>99. Mobile device management (MDM) ensures<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/strong><\/mark><br>A) Security, configuration, and monitoring of mobile devices<br>B) Only cloud backups<br>C) Antivirus installation<br>D) Firewall configuration<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  MDM protects corporate data on smartphones and tablets.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">100. Zero Trust Network Access (ZTNA) differs from traditional VPN by<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"> _________.<\/mark><\/strong><\/mark><\/strong><br>A) Allowing unrestricted access<br>B) Granting access based on identity, device, and context<br>C) Encrypting only emails<br>D) Blocking all cloud access<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B  <\/b><BR>\n<b>Explanation:<\/b>  ZTNA enforces granular, context-aware access controls instead of trusting internal networks.\n <\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. Computer security is mainly concerned with ________.A) Protecting software from errorsB) Protecting data and systems from unauthorized accessC) Improving hardware performanceD) Reducing power consumption Show Answer Answer: B Explanation: Computer security ensures confidentiality, integrity, and availability of data and systems. 2. The term \u201ccybersecurity\u201d refers to _________.A) Hardware repairB) Protection of Internet-connected systemsC) Software<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]"},"categories":[2],"tags":[20418,20419,4029,5649,5652,5623],"class_list":{"0":"post-17948","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computer","7":"tag-computer-security","8":"tag-computer-security-100-mcqs-with-answer-and-explanation","9":"tag-mcqs-adda","10":"tag-mcqs-for-pc-psi-sda-fda-pdo-vao-banking-kas-ias-ssc-gd-ssc-chsl-ssc-cgl-for-all-compitative-exams","11":"tag-mcqs-for-pc-psi-sda-fda-pdo-vao-banking-kas-ias-ssc-gd-ssc-chsl-ssc-cgl-for-all-compitative-examsin-kannada","12":"tag-mcqs-for-sda-fda-pdo-vao-banking-kas-ias-ssc-gd-ssc-chsl-ssc-cgl-for-all-compitative-exams"},"_links":{"self":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/comments?post=17948"}],"version-history":[{"count":102,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17948\/revisions"}],"predecessor-version":[{"id":34914,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17948\/revisions\/34914"}],"wp:attachment":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/media?parent=17948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/categories?post=17948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/tags?post=17948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}