Cyber Security and Emerging Technologies MCQ Quiz - Objective Question with Answer for Cyber Security and Emerging Technologies - Download Free PDF
Last updated on Jun 10, 2025
Latest Cyber Security and Emerging Technologies MCQ Objective Questions
Cyber Security and Emerging Technologies Question 1:
Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 1 Detailed Solution
The correct answer is botnets
Key Points
- Botnets are networks of infected devices, often referred to as "bots", which are controlled by a central server.
- In mobile systems, these botnets can lie dormant and wait for the owner to trigger a cyber attack.
- Botnets can be used to execute Distributed Denial of Service (DDoS) attacks, sending massive amounts of traffic to targeted servers to overwhelm and disable them.
- These networks can be highly sophisticated, leveraging numerous infected devices to maximize their impact.
- Botnets are a significant security threat as they can be used for various malicious activities beyond DDoS attacks, including spamming, data theft, and unauthorized access.
Additional Information
- DDoS (Distributed Denial of Service) attacks aim to make an online service unavailable by overwhelming it with traffic from multiple sources.
- Mobile devices can be particularly vulnerable to becoming part of a botnet due to less stringent security measures compared to traditional computers.
- It's crucial to maintain up-to-date security software and be cautious of suspicious applications to prevent devices from becoming part of a botnet.
- Law enforcement agencies and cybersecurity experts continually work to identify and dismantle botnets to mitigate their threat.
Cyber Security and Emerging Technologies Question 2:
Which of the following algorithms is used for reinforcement machine learning ?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 2 Detailed Solution
Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones. In general, a reinforcement learning agent is able to perceive and interpret its environment, take actions and learn through trial and error.
Reinforcement learning algorithms are mainly used in AI applications and gaming applications.
The main used algorithms are:
Q-Learning: Q-learning is an Off policy RL algorithm, which is used for temporal difference learning.
Hence the correct answer is Q-learning.
Additional Information
- Naive Bayes classification is a form of supervised learning. It is considered to be supervised since naive Bayes classifiers are trained using labeled data.
- Principal Component Analysis (PCA) is an unsupervised, non-parametric statistical technique primarily used for dimensionality reduction in machine learning.
- Fast Forest Quantile Regression keeps all the predicted labels in trees specified by the parameter Quantile sample count and outputs the distribution so that the user can view the quantile values for the given instance.
Cyber Security and Emerging Technologies Question 3:
______ is malicious software that alters the regular functionality of an OS, takes full control on the targeted system and acts as the system administrator on the victim's system.
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 3 Detailed Solution
The correct answer is option 4.
Key Points
- Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware, or rootkits.
- Rootkit: A rootkit is a malicious software that modifies the ordinary operation of an operating system on a computer invisibly. The alteration allows the hacker to get complete control of the machine, and the hacker operates as the victim's system administrator. Almost all rootkits are designed to remain undetected.
Hence the correct answer is Rootkit.
Additional Information
- A Trojan Horse Virus is a sort of malware that infiltrates a computer while masquerading as genuine software. Typically, an attacker will employ social engineering to embed harmful code within genuine software in order to acquire system access with their program.
- Spyware is a kind of harmful software, often known as malware, that is placed on a computer without the end user's knowledge. It infiltrates the device, obtains sensitive information and internet usage statistics, and then sends it to advertising, data corporations, or other users.
Cyber Security and Emerging Technologies Question 4:
Which of the following is an example of popular antivirus?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 4 Detailed Solution
option 1) is correct answ
Antivirus software deals with the security of a computer system.
Key Points
- Antivirus software, or anti-virus software, is also known as anti-malware.
- It is a computer program used to prevent, detect, and remove malware.
- Various important Antivirus:
- Bitdefender Antivirus Plus. Well, rounded everyday antivirus protection.
- Norton AntiVirus Plus. Smooth protection for your system.
- Avira Antivirus Pro.
- F-Secure Antivirus SAFE.
- Kaspersky Anti-Virus.
- Trend Micro Antivirus+ Security.
- Webroot SecureAnywhere AntiVirus.
- ESET NOD32 Antivirus.
Additional Information
Worms
A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.
Sasser
Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.
Cyber Security and Emerging Technologies Question 5:
Functional expression of the idea/invention will be protected by ______
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 5 Detailed Solution
The correct answer is patent.
Key Points
- A patent is an invention-grounded legal document that defines and provides the deliverer with exclusive rights to count others from producing, dealing, or distributing such an invention.
- Functional expression of the idea/invention will be protected by patent.
- The violation of these exclusive rights of the patent holder is known as a patent violation.
- A patent protects an invention for 20 years from the date the patent is applied, after which it can be freely used.
Additional Information
- Copyright: Copyright is referred to as a tool used to protect the authors' original works like novels, art, architecture, music and so on. The copyright ensures that only the owner has the right to project, share and license the content.
- Registered trademark: A registered trademark is used for protecting the brands, logos, and slogans of an organisation.
Top Cyber Security and Emerging Technologies MCQ Objective Questions
Which of the following is a type of cyber attack that involves tricking users into revealing sensitive information?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 6 Detailed Solution
Download Solution PDFThe correct answer is Option 1.
Key Points
Phishing
- It is cyber-attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email.
- It is a type of cyber attack that involves tricking users into revealing sensitive information. Hence, Option 1 is correct.
- The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine.
- The first phishing lawsuit was filed in 2004 against a Californian teenager who created the imitation of the website “America Online”. With this fake website, he was able to gain sensitive information from users and access their credit card details to withdraw money from their accounts.
- Other than email and website phishing, there’s also 'vishing' (voice phishing), 'smishing' (SMS Phishing), and several other phishing techniques cybercriminals are constantly coming up with.
Additional Information
SQL Injection (SQLi)
- It is a type of injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures.
DOS attack
- A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning.
______ is malicious software that alters the regular functionality of an OS, takes full control on the targeted system and acts as the system administrator on the victim's system.
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 7 Detailed Solution
Download Solution PDFThe correct answer is option 4.
Key Points
- Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware, or rootkits.
- Rootkit: A rootkit is a malicious software that modifies the ordinary operation of an operating system on a computer invisibly. The alteration allows the hacker to get complete control of the machine, and the hacker operates as the victim's system administrator. Almost all rootkits are designed to remain undetected.
Hence the correct answer is Rootkit.
Additional Information
- A Trojan Horse Virus is a sort of malware that infiltrates a computer while masquerading as genuine software. Typically, an attacker will employ social engineering to embed harmful code within genuine software in order to acquire system access with their program.
- Spyware is a kind of harmful software, often known as malware, that is placed on a computer without the end user's knowledge. It infiltrates the device, obtains sensitive information and internet usage statistics, and then sends it to advertising, data corporations, or other users.
The feature(s) of cyber security is/are:
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 8 Detailed Solution
Download Solution PDFThe correct answer is All of the above
Key PointsFeatures of cyber security:
- Compliance: Utilizes passwords, biometric data, and other forms of user identification to verify identity.
- Encryption: Converts sensitive data into coded language to prevent unauthorized access.
- Firewalls: Shields network systems from potential threats by monitoring and controlling incoming and outgoing network traffic.
- Intrusion Detection System (IDS): Monitors network traffic to identify malicious activities.
- Anti-malware Protection: Protects systems from malware such as viruses, ransomware, and spyware.
- Secure Sockets Layer (SSL): Establishes an encrypted link between a web server and a browser, securing data transfer.
- Defence against internal threats: Provides real-time analysis of security alerts.
- Multi-factor Authentication (MFA) for Threat Prevention: Requires multiple methods of verification to ensure identity.
- Data Loss Prevention (DLP): Prevents sensitive data from leaving the secure network.
- Incident Response: Plans and manages response to a security breach or attack.
- Regular Updates: Patches and updates to secure against known vulnerabilities.
- Network Segmentation: Splits networks into separate parts to limit attack surfaces and improve performance.
- User and Entity Behavior Analytics (UEBA): Detects abnormal behavior or anomalies in networks.
- Privacy by Design: Integrates data protection from the onset of the system design.
- Security Awareness Training: Equips users with knowledge to recognize and avoid cyber threats.
What is the purpose of a firewall in cyber security?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 9 Detailed Solution
Download Solution PDFThe correct answer is Option 2.
Key PointsFirewall
- It is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
- The purpose of a Firewall is to establish a barrier between your internal network and incoming traffic from external sources in order to block malicious traffic like viruses and hackers. Hence, Option 2 is correct.
Additional Information
- Firewalls are commonly used to help prevent unauthorized access to both company and home networks.
- Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet.
- Hardware firewalls are found on most network routers and can be configured through the router setup screen.
Under Section 66F of the Information Technology Act 2000, what is the penalty for "Acts of cyber terrorism" offence?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 10 Detailed Solution
Download Solution PDFThe correct answer is Imprisonment up to life.
Key Points
- A person can face life imprisonment if he/she denies authorized personnel access to the computer resource or attempts to penetrate/access a computer resource without authorization, with an aim to threaten the unity, integrity, security, or sovereignty of the nation.
- This is a non-bailable offense.
- The term "cyber-crimes" is not defined in any statute or rulebook.
- The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
- Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.
Which of the following is an example of popular antivirus?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 11 Detailed Solution
Download Solution PDFThe correct answer is Bitdefender
Antivirus software deals with the security of a computer system.
Key Points
- Antivirus software, or anti-virus software, is also known as anti-malware.
- It is a computer program used to prevent, detect, and remove malware.
- Various important Antivirus:
- Bitdefender Antivirus Plus. Well, rounded everyday antivirus protection.
- Norton AntiVirus Plus. Smooth protection for your system.
- Avira Antivirus Pro.
- F-Secure Antivirus SAFE.
- Kaspersky Anti-Virus.
- Trend Micro Antivirus+ Security.
- Webroot SecureAnywhere AntiVirus.
- ESET NOD32 Antivirus.
Additional Information
- Worms
- A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.
- Sasser
- Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.
What does data encryption involve?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 12 Detailed Solution
Download Solution PDFThe correct answer is Encoding data into a secret code.
Key PointsData Encryption:
- Data encryption is the process of converting plain text into encoded, unreadable data (secret code) to protect it from unauthorized access.
- It is used to secure sensitive information, such as financial transactions, personal data, and confidential communications.
- Encryption algorithms use mathematical formulas to scramble the data, making it unreadable without the proper decryption key.
- The most common encryption methods include symmetric key encryption, asymmetric key encryption, and hashing algorithms.
- Symmetric key encryption uses a single key to both encrypt and decrypt the data, while asymmetric key encryption uses a pair of keys (public and private) for encryption and decryption.
- Hashing algorithms create a unique digital fingerprint of the data, which can be used to verify its integrity but cannot be reversed to reveal the original data.
- Encryption can be applied to various forms of data, including files, emails, messages, and network traffic.
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols that use encryption to secure communication over the internet.
- End-to-end encryption ensures that only the sender and recipient can access the encrypted data, even if it is transmitted through third-party servers.
- Data encryption helps organizations comply with data protection regulations and standards, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).
- Quantum encryption is a cutting-edge method that uses the principles of quantum mechanics to secure data against future quantum computing threats.
- Encryption keys should be carefully managed and protected to prevent unauthorized access to the encrypted data.
- Decryption requires the correct key or password, without which the encrypted data remains unreadable.
- Encryption can be used in combination with other security measures, such as access controls, firewalls, and intrusion detection systems, to create a layered defense against cyber threats.
Which of the following languages is suitable for artificial intelligence?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 13 Detailed Solution
Download Solution PDFThe Correct Answer: Prolog is a general-purpose programming language associated with artificial intelligence and computational linguistics.
- All of the listed languages can be used to implement some form of AI, but each one is suitable for different aspects of AI.
Key Points
- Fortran: It's an old language typically used for numerical and scientific computing. It's not commonly used for modern AI applications but can still be used if necessary, especially for tasks that require heavy numerical computations.
- Basic: It's a beginner-friendly language. Though it's not typically used for AI applications due to the lack of advanced data structures and libraries, it can be used to implement simple AI systems.
- Prolog: It's a logic programming language often associated with AI, especially in the domain of expert systems, natural language processing, and knowledge representation. It supports pattern matching and automatic backtracking, which are powerful for these types of tasks.
- 'C': It's a low-level, general-purpose language. It can be used for AI development, but it might not be the most efficient choice. It lacks the high-level abstractions and libraries (such as TensorFlow or PyTorch) that Python provides, which are commonly used in AI.
Out of these options, Prolog is likely the most directly associated with AI.
Additional InformationHowever, it should be noted that in current AI development, Python is by far the most widely used language due to its simplicity, flexibility, and the broad ecosystem of AI and machine learning libraries available. Other languages like Java, R, and Julia are also often used.
Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 14 Detailed Solution
Download Solution PDFThe correct answer is websites
Key Points
- Websites are commonly targeted by cyber attackers to fetch the IP addresses of target or victim users.
- Attackers often use techniques such as phishing, social engineering, or malicious scripts embedded in websites to obtain IP addresses.
- Once an IP address is obtained, it can be used to gather more information about the target, such as their location, internet service provider, and potential vulnerabilities.
- This information can then be used for further attacks, including Distributed Denial of Service (DDoS) attacks, hacking attempts, or other malicious activities.
Additional Information
- Emails and web pages are also potential sources of IP addresses, but websites are more frequently used by attackers due to the higher volume of traffic and interactions.
- Users should be cautious when visiting unknown websites or clicking on suspicious links to protect their IP address and personal information.
- Using VPNs or proxy servers can help mask a user's real IP address, providing an additional layer of security.
Which of the following is an example of popular antivirus?
Answer (Detailed Solution Below)
Cyber Security and Emerging Technologies Question 15 Detailed Solution
Download Solution PDFoption 1) is correct answ
Antivirus software deals with the security of a computer system.
Key Points
- Antivirus software, or anti-virus software, is also known as anti-malware.
- It is a computer program used to prevent, detect, and remove malware.
- Various important Antivirus:
- Bitdefender Antivirus Plus. Well, rounded everyday antivirus protection.
- Norton AntiVirus Plus. Smooth protection for your system.
- Avira Antivirus Pro.
- F-Secure Antivirus SAFE.
- Kaspersky Anti-Virus.
- Trend Micro Antivirus+ Security.
- Webroot SecureAnywhere AntiVirus.
- ESET NOD32 Antivirus.
Additional Information
Worms
A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.
Sasser
Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.