Information Security Quiz Questions and answers 2021
This is the latest set of Information Security Quiz Questions and answers. A new set of Cyber Security Quiz is coming up on ITQuiz.in.
1. How does a Le-Hard virus come into existence?
And:Command.Com
2. What is ransomware based on?
Ans: Fear of losing important files
3. A malicious code that combines characteristics of both those types of malware, typically the virus ability to alter program code with the worm’s ability to reside in live memory and to propagate without any action on the part of the user
Ans: hybrid virus/worm
4.__________ major Ransomware Trojan targeting windows in 2014 ?
Ans: Cryptowall
5.________ is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks
Ans: Grayware
6. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
Ans: Trojan Horse
Information Security Quiz
7. A collection of zombies is known as:
Ans: Botnet
8. What is the name of the first boot sector virus?
Ans: Brain Virus
9. What is the name of the first computer virus?
Ans: Creeper
10.Phishing by text message is called ________?
Ans: Smishing
11. When one participant in a communication pretends to be someone else, it is called _________?
Ans: Masquerade
12._________ propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on a local and mounted network
Ans: CryptoLocker
Information Security Quiz Questions and answers 2021
13. Identify this logo
Ans: Information Security Education and Awareness
Information Security Quiz
14._________ is a trojan horse that allows an attacker to log in as any user on the compromised computer without the correct password
Ans: Trojan.Skelky
15._________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities
Ans: Whale phishing
16. X is a computer virus that made its appearance on March 26th, 1999 in the United States causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.
When opening a file infected with the ‘Melissa’, the virus generates an e-mail with the below template
- Subject: Important Message From “sender name”
- Text: Here is that document you asked for … do not show anyone else?
- Attachments: a file with a DOC.
Name the virus?
Ans: Melissa
17._______ is a ransomware malware delivered by email that was allegedly an invoice requiring payment with an attached Microsoft Word document that contains malicious macros?
Ans: LOCKY
18._____ is a trojan that targets Microsoft Windows to steal banking information by keystroke logging?
Ans: ZEUS
19. Name the mobile security application developed by the C-DAC
Ans: M-Kavach
20. The Government of India has launched a new desktop and mobile security solution named _________, through its Computer Emergency Response Team (CERT-in).
Ans: Cyber Swachhta Kendra
Information Security Quiz | Also check out 100+ cyber security Quiz Questions and answers
21. Identify the logo
Ans: m-KAVACH
22. TLS is a protocol that provides added security to two communicating devices, TLS is evolved from SSL.
Expand TLS?
Ans: Transport Layer Security
23. The Secure Sockets Layer (SSL) Protocol was adopted by ________ in 1994 which is an important protocol for secure communication between two devices.
Ans: Netscape
Information Security Quiz
24. _______ is a free Security Tool to control usage of removable USB storage media launched by the C-DAC
Ans: USB Pratirodh
25._________ is a nation-wide initiative, supported by DEIT and executed by C-DAC, Hyderabad. InDG facilitates rural empowerment through the provision of credible information products and services in local languages that respond to the real and strategic needs of the unreached especially women and the poor.
Ans: India Development Gateway (InDG)
Hope you gained something from this set of Information Security Quiz. Are you an Information Security Guy? Then contribute some questions on Cyber Security Quiz to amal@itquiz.in. Let me know your views on these questions and answers to the comments.
whoah this blog is great i love reading your articles. Keep up the good work! You know, lots of people are looking around for this info, you could help them greatly.
Vital amount of information.. thanks
You’re most welcome to contribute more. Thanks for visiting ITQuiz.in
Very well curated set of questions. Thank you so much.
Thanks
best questions ever, plese publish more and more information and security related quiz questions.
Query: Having a_________is important to help large organizations continue operating until normal computer operations can be restored?
1. Firewall protection scheme
2.Encryption coding process
3.Business continuity plan
4.virus encryption programs
Firewall protection scheme
can you upload more questions based on important mascots and logos
it would be a great help