Information Security

Information Security Quiz Questions and Answers | InfoSec Quiz

5 / 5 ( 3 votes )

Information Security Quiz Questions and answers 2021

This is the latest set of Information Security Quiz Questions and answers. A new set of Cyber Security Quiz is coming up on ITQuiz.in.

1. How does a Le-Hard virus come into existence?

And:Command.Com

2. What is ransomware based on?

Ans: Fear of losing important files

3. A malicious code that combines characteristics of both those types of malware, typically the virus ability to alter program code with the worm’s ability to reside in live memory and to propagate without any action on the part of the user

Ans: hybrid virus/worm

4.__________ major Ransomware Trojan targeting windows in 2014 ?

Ans: Cryptowall

5.________ is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks

Ans: Grayware

6. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

Ans: Trojan Horse

Information Security Quiz

7. A collection of zombies is known as:

Ans: Botnet

8. What is the name of the first boot sector virus?

Ans: Brain Virus

9. What is the name of the first computer virus?

Ans: Creeper

10.Phishing by text message is called ________?

Ans: Smishing

11. When one participant in a communication pretends to be someone else, it is called _________?

Ans: Masquerade

12._________ propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on a local and mounted network

Ans: CryptoLocker

Information Security Quiz Questions and answers 2021

13. Identify this logo

Ans: Information Security Education and Awareness

Information Security Quiz

14._________ is a trojan horse that allows an attacker to log in as any user on the compromised computer without the correct password

Ans: Trojan.Skelky

15._________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities

Ans: Whale phishing

16. X is a computer virus that made its appearance on March 26th, 1999 in the United States causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

When opening a file infected with the ‘Melissa’, the virus generates an e-mail with the below template

  • Subject: Important Message From “sender name”
  • Text: Here is that document you asked for … do not show anyone else?
  • Attachments: a file with a DOC.

Name the virus?

Ans: Melissa

17._______ is a ransomware malware delivered by email that was allegedly an invoice requiring payment with an attached Microsoft Word document that contains malicious macros?

Ans: LOCKY

18._____ is a trojan that targets Microsoft Windows to steal banking information by keystroke logging?

Ans: ZEUS

19. Name the mobile security application developed by the C-DAC

Ans: M-Kavach

wazirx referral code

20. The Government of India has launched a new desktop and mobile security solution named _________, through its Computer Emergency Response Team (CERT-in).

Ans: Cyber Swachhta Kendra

Information Security Quiz | Also check out 100+ cyber security Quiz Questions and answers

21. Identify the logo

Ans: m-KAVACH

22. TLS is a protocol that provides added security to two communicating devices, TLS is evolved from SSL.

Expand TLS?

Ans: Transport Layer Security

23. The Secure Sockets Layer (SSL) Protocol was adopted by ________ in 1994 which is an important protocol for secure communication between two devices.

Ans: Netscape

Information Security Quiz

24. _______ is a free Security Tool to control usage of removable USB storage media launched by the C-DAC

Ans: USB Pratirodh

25._________ is a nation-wide initiative, supported by DEIT and executed by C-DAC, Hyderabad. InDG facilitates rural empowerment through the provision of credible information products and services in local languages that respond to the real and strategic needs of the unreached especially women and the poor.

Ans: India Development Gateway (InDG)

Hope you gained something from this set of Information Security Quiz. Are you an Information Security Guy? Then contribute some questions on Cyber Security Quiz to amal@itquiz.in. Let me know your views on these questions and answers to the comments.

Amal Augustine

Blogger | Developer  | Quizzer. I'm Amal Augustine, a student of St Stephen's College Delhi. Apart from my interest in Quizzing, I'm interested in Software Development and I work on Flutter, Dart, C#,JAVA,.NET, Android, SEO, Digital Marketing, etc..

View Comments

Recent Posts

Join IT Quiz WhatsApp Group

Hey. You're most welcome to join our IT Quizzers WhatsApp group which we started 8…

4 months ago

Download ExQuizMe App | Play IT/Tech Quiz with friends

Are you an IT or tech enthusiast looking for a thrilling way to test your…

4 months ago

Rural IT Quiz National Final

First Round (Byte Clouds) Q1. This is a pictorial representation of a facial expression using…

9 months ago

TCS IT Wiz 2020 Quarter final

(Digital Readiness) Q1. Who is this extremely important innovator, and the founder pf Khan Academy.…

9 months ago

Tcs Inquizitive 2023. 10th Quarter final

First Round (Predictive Intelligence) Q1. This Google doodle was made to celebrate Olas Romer's experiment…

9 months ago

TCS Inquizitive 2023 National Finals

First Frontier  (Predictive Intelligence) Q1. What is the cause of these marks on the face…

9 months ago