Cyber Security MCQ
1. The __________________________enforces trade sanctions and embargoes.
Answer
Correct Answer:
Office of Foreign Assets Control (OFAC)
Note: This Question is unanswered, help us to find answer for this one
2. The __________________ was created after a security breach at a state-operated data facility.
Answer
Correct Answer:
California Database Security Breach Notification Act
Note: This Question is unanswered, help us to find answer for this one
3. The __________ defines stiffer penalties for prosecution of terrorist crimes.
Answer
Correct Answer:
USA Patriot Act
Note: This Question is unanswered, help us to find answer for this one
4. Adolescent victims of cyberbullying are likely to _____.
Answer
Correct Answer:
Experience depression
Note: This Question is unanswered, help us to find answer for this one
5. Id badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.
Note: This Question is unanswered, help us to find answer for this one
6. Cas distribute public keys ________.
Answer
Correct Answer:
In digital certificates
Note: This Question is unanswered, help us to find answer for this one
7. An airport security scanner is an example of a ____________ computer.
Answer
Correct Answer:
Special purpose
Note: This Question is unanswered, help us to find answer for this one
8. A _____ is a downloadable image that can be used to scan a computer for malware.
Answer
Correct Answer:
Rescue disc
Note: This Question is unanswered, help us to find answer for this one
9. All of the following are security risks associated with the ares system, except ________.
Answer
Correct Answer:
Doctors and trainers may be restricted to viewing only partial data
Note: This Question is unanswered, help us to find answer for this one
10. The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.
Answer
Correct Answer:
Digital signature.
Note: This Question is unanswered, help us to find answer for this one
11. When encrypting a file, a fully punctuated passphrase should have a minimum of ____ characters.
Answer
Correct Answer:
20 characters
Note: This Question is unanswered, help us to find answer for this one
12. ____ requires effective backup strategies and flexible hardware configurations.
Answer
Correct Answer:
Data recovery
Note: This Question is unanswered, help us to find answer for this one
13. ____ is used both for intrusion analysis and as part of evidence collection and analysis.
Answer
Correct Answer:
Forensics
Note: This Question is unanswered, help us to find answer for this one
14. Malicious software can be hidden in a ________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
15. What is identification?
Answer
Correct Answer:
Telling the system who you are
Note: This Question is unanswered, help us to find answer for this one
16. What is the purpose of Role Based Access Control models?
Answer
Correct Answer:
To define a series of roles and assign them to subjects
Note: This Question is unanswered, help us to find answer for this one
17. What does DAC stand for?
Answer
Correct Answer:
Discretionary Access Control
Note: This Question is unanswered, help us to find answer for this one
18. Who manages access controls in Mandatory Access Control models?
Answer
Correct Answer:
Administrator
Note: This Question is unanswered, help us to find answer for this one
19. What is Access Control?
Answer
Correct Answer:
Controlling access to resources on a computer or network system
Note: This Question is unanswered, help us to find answer for this one
Computer Engineering MCQs | Topic-wise