London Escorts sunderland escorts

Information Security Quiz Questions and Answers | InfoSec Quiz

Set of 50 information security quiz questions and answers

Amal Augustinehttp://www.ITQuiz.in
Blogger | Developer  | Quizzer. I'm Amal Augustine, a student of St Stephen's College Delhi. Apart from my interest in Quizzing, I'm interested in Software Development and I work on Flutter, Dart, C#,JAVA,.NET, Android, SEO, Digital Marketing, etc..
- Advertisement -
- Advertisement -

Information Security Quiz Questions and answers 2021

This is the latest set of Information Security Quiz Questions and answers. A new set of Cyber Security Quiz is coming up on ITQuiz.in.

1. How does a Le-Hard virus come into existence?

And:Command.Com

2. What is ransomware based on?

Ans: Fear of losing important files

3. A malicious code that combines characteristics of both those types of malware, typically the virus ability to alter program code with the worm’s ability to reside in live memory and to propagate without any action on the part of the user

Ans: hybrid virus/worm

4.__________ major Ransomware Trojan targeting windows in 2014 ?

Ans: Cryptowall

5.________ is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks

Ans: Grayware

6. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

Ans: Trojan Horse

Information Security Quiz

7. A collection of zombies is known as:

Ans: Botnet

8. What is the name of the first boot sector virus?

Ans: Brain Virus

9. What is the name of the first computer virus?

Ans: Creeper

10.Phishing by text message is called ________?

Ans: Smishing

11. When one participant in a communication pretends to be someone else, it is called _________?

Ans: Masquerade

12._________ propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on a local and mounted network

Ans: CryptoLocker

Information Security Quiz Questions and answers 2021

13. Identify this logo

Ans: Information Security Education and Awareness

Information Security Quiz

14._________ is a trojan horse that allows an attacker to log in as any user on the compromised computer without the correct password

Ans: Trojan.Skelky

15._________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities

Ans: Whale phishing

16. X is a computer virus that made its appearance on March 26th, 1999 in the United States causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

When opening a file infected with the ‘Melissa’, the virus generates an e-mail with the below template

  • Subject: Important Message From “sender name”
  • Text: Here is that document you asked for … do not show anyone else?
  • Attachments: a file with a DOC.

Name the virus?

Ans: Melissa

17._______ is a ransomware malware delivered by email that was allegedly an invoice requiring payment with an attached Microsoft Word document that contains malicious macros?

Ans: LOCKY

18._____ is a trojan that targets Microsoft Windows to steal banking information by keystroke logging?

Ans: ZEUS

19. Name the mobile security application developed by the C-DAC

Ans: M-Kavach

wazirx referral code

20. The Government of India has launched a new desktop and mobile security solution named _________, through its Computer Emergency Response Team (CERT-in).

Ans: Cyber Swachhta Kendra

Information Security Quiz | Also check out 100+ cyber security Quiz Questions and answers

21. Identify the logo

Ans: m-KAVACH

22. TLS is a protocol that provides added security to two communicating devices, TLS is evolved from SSL.

Expand TLS?

Ans: Transport Layer Security

23. The Secure Sockets Layer (SSL) Protocol was adopted by ________ in 1994 which is an important protocol for secure communication between two devices.

Ans: Netscape

Information Security Quiz

24. _______ is a free Security Tool to control usage of removable USB storage media launched by the C-DAC

Ans: USB Pratirodh

25._________ is a nation-wide initiative, supported by DEIT and executed by C-DAC, Hyderabad. InDG facilitates rural empowerment through the provision of credible information products and services in local languages that respond to the real and strategic needs of the unreached especially women and the poor.

Ans: India Development Gateway (InDG)

Hope you gained something from this set of Information Security Quiz. Are you an Information Security Guy? Then contribute some questions on Cyber Security Quiz to amal@itquiz.in. Let me know your views on these questions and answers to the comments.

- Advertisement -
Amal Augustinehttp://www.ITQuiz.in
Blogger | Developer  | Quizzer. I'm Amal Augustine, a student of St Stephen's College Delhi. Apart from my interest in Quizzing, I'm interested in Software Development and I work on Flutter, Dart, C#,JAVA,.NET, Android, SEO, Digital Marketing, etc..

Latest Quiz

Join IT Quiz WhatsApp Group

Hey. You're most welcome to join our IT Quizzers WhatsApp group which we started 8 years ago.Attention IT quiz enthusiasts! 🎉 Are you gearing...
- Advertisement -

Download ExQuizMe App | Play IT/Tech Quiz with friends

Are you an IT or tech enthusiast looking for a thrilling way to test your knowledge and compete with others? Look no further! ExQuizMe...

Rural IT Quiz National Final

First Round (Byte Clouds) Q1. This is a pictorial representation of a facial expression using Character.Answer : EMOTICONQ2. This Public Blockchain Platform has Ada as its...

TCS IT Wiz 2020 Quarter final

(Digital Readiness) Q1. Who is this extremely important innovator, and the founder pf Khan Academy.Answer : Sal Khan Q2. A great man who said "school sometimes...

Related news

Join IT Quiz WhatsApp Group

Hey. You're most welcome to join our IT Quizzers WhatsApp group which we started 8 years ago.Attention IT quiz enthusiasts! 🎉 Are you gearing...

Download ExQuizMe App | Play IT/Tech Quiz with friends

Are you an IT or tech enthusiast looking for a thrilling way to test your knowledge and compete with others? Look no further! ExQuizMe...

Rural IT Quiz National Final

First Round (Byte Clouds) Q1. This is a pictorial representation of a facial expression using Character.Answer : EMOTICONQ2. This Public Blockchain Platform has Ada as its...

TCS IT Wiz 2020 Quarter final

(Digital Readiness) Q1. Who is this extremely important innovator, and the founder pf Khan Academy.Answer : Sal Khan Q2. A great man who said "school sometimes...
- Advertisement -

9 COMMENTS

  1. whoah this blog is great i love reading your articles. Keep up the good work! You know, lots of people are looking around for this info, you could help them greatly.

  2. Query: Having a_________is important to help large organizations continue operating until normal computer operations can be restored?
    1. Firewall protection scheme
    2.Encryption coding process
    3.Business continuity plan
    4.virus encryption programs

LEAVE A REPLY

Please enter your comment!
Please enter your name here

📱Download our App ExQuizMe to play 1 vs 1 quizzes, group quizzes on 100,000+ free MCQs.