security aspects mcq,security aspects class 12 mcq,security aspects,mcq on security aspects,mcq on security aspects with answers pdf,mcq on security aspects with answers,mcq on security aspects pdf free download,mcq on security aspects pdf,mcq on security aspects pdf download,security aspects mcq with answers pdf,security aspects class 12 mcq with answers pdf
1. Which term describes software developed specifically to damage hardware, steal data, or cause other trouble?
2. What is the ideal but impractical way to eliminate network security threats?
3. In network security, a vulnerability is best defined as:
4. Which of the following is NOT a type of malware listed in the chapter?
5. Who coined the term “computer virus” in 1985?
6. What characteristic distinguishes a worm from a virus?
7. Which malware type encrypts user data and demands payment for decryption?
8. The WannaCry outbreak in May 2017 spread by:
9. A Trojan spreads primarily by:
10. Spyware is designed to:
11. Adware generates revenue by:
12. Which countermeasure thwarts software keyloggers by randomizing key layout?
13. A keylogger’s primary function is to:
14. Which of the following is a common malware distribution channel?
15. What sign might indicate a malware infection?
16. Which preventive measure ensures malware definitions stay current?
17. Signature-based detection relies on:
18. Sandbox detection identifies malware by:
19. Heuristic analysis in antivirus software compares code against:
20. Real-time protection monitors:
21. Spam is most commonly associated with:
22. Which protocol sends data without encryption?
23. Which protocol encrypts data in transit?
24. HTTPS requires which of the following on the server?
25. A firewall placed between two networks is called a:
26. A firewall on an individual computer is known as:
27. The original term “magic cookie” referred to:
28. Session cookies are primarily used to:
29. Zombie cookies are characterized by:
30. Which cookie type may share data with third parties without consent?
31. Ethical hackers hired to fix security flaws are known as:
32. Hackers who exploit flaws for illegal gain are:
33. Hackers who operate between ethical and malicious intent are:
34. A DoS attack aims to:
35. In a DDoS attack, traffic originates from:
36. Asymmetric routing in intrusion involves:
37. A buffer overflow attack works by:
38. Traffic flooding against an intrusion detection system causes:
39. Snooping (sniffing) refers to:
40. Eavesdropping differs from snooping by being:
41. Which tool or feature may legitimately be used for snooping by administrators?
42. An example of network propagation of malware is:
43. One sign of malware infection is:
44. Which practice helps prevent malware via removable media?
45. A common preventive measure against ransomware is:
46. Which method does NOT identify polymorphic malware effectively?
47. Which method uses machine learning to classify files?
48. An authentication cookie is used to:
49. Which attack involves secretly listening via a hidden microphone?
50. The first barrier against network-based malware like worms is typically the:
51. Assertion (A): A worm does not require a host program to spread. Reason (R): Worms are standalone programs capable of self-replication across networks without user intervention.
52. Assertion (A): A Trojan can self-replicate and infect other files. Reason (R): A Trojan disguises itself as legitimate software and spreads only when a user installs it.
53. Assertion (A): Ransomware always encrypts data before demanding payment. Reason (R): Some ransomware simply blocks access to data without encryption.
54. Assertion (A): Signature-based detection fails against polymorphic malware. Reason (R): Polymorphic malware changes its code signature with each infection.
55. Assertion (A): Heuristic analysis can detect previously unknown malware. Reason (R): Heuristics compare suspect code against a database of known behavioural patterns.
56. Assertion (A): An online virtual keyboard uses a fixed QWERTY layout. Reason (R): A fixed layout can be exploited by sophisticated keylogger software.
57. Assertion (A): Session cookies expire when a browser session ends. Reason (R): Session cookies store user preferences permanently across visits.
58. Assertion (A): HTTPS encrypts data before transmission. Reason (R): HTTPS requires an SSL digital certificate on the server for encryption and decryption.
59. Assertion (A): A host-based firewall monitors traffic between networks. Reason (R): Host-based firewalls are installed on individual machines to filter their own traffic.
60. Assertion (A): Grey hat hackers exploit vulnerabilities for political gains. Reason (R): Grey hats hack systems for challenge rather than monetary or political motives.
61. Assertion (A): A DDoS attack is easier to mitigate than a DoS attack. Reason (R): DDoS uses multiple distributed sources, complicating traffic filtering.
62. Assertion (A): Buffer overflow attacks overwrite memory with malicious code. Reason (R): Intrusion sensors detect buffer overflow by monitoring packet size only.
63. Assertion (A): Snooping requires real-time interception of live communication. Reason (R): Snooping captures network traffic for later analysis rather than live monitoring.
64. Assertion (A): Eavesdropping can occur via rootkit malware on devices. Reason (R): Rootkits enable unauthorized access to built-in microphones and cameras.
65. Assertion (A): Spam filters learn from user-marked spam to block future messages. Reason (R): Marking spam trains the service’s automatic detection algorithm.
66. Assertion (A): Supercookies resemble legitimate cookies and evade deletion. Reason (R): Zombie cookies are recreated after deletion by websites.
67. Assertion (A): Signature-based antivirus requires real-time monitoring to detect dormant malware. Reason (R): Signature-based detection only scans files at rest, not active memory behaviour.
68. Assertion (A): Data mining techniques in antivirus use machine learning models. Reason (R): Machine learning can classify unknown files as benign or malicious based on features.
69. Assertion (A): An on-screen keyboard randomizes key placement each use. Reason (R): Randomization prevents recording of actual keys pressed by hardware keyloggers.
70. Assertion (A): Regular backups are a preventive measure against ransomware. Reason (R): Backups allow recovery of data without paying ransom.

No comments: