Cyber Security and Emerging Technologies MCQ Quiz - Objective Question with Answer for Cyber Security and Emerging Technologies - Download Free PDF

Last updated on Jun 5, 2025

Latest Cyber Security and Emerging Technologies MCQ Objective Questions

Cyber Security and Emerging Technologies Question 1:

A _________ is a hacker with an aim to bring about political and social change.

  1. White hats
  2. Hacktivist
  3. Black hats
  4. Grey hats
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : Hacktivist

Cyber Security and Emerging Technologies Question 1 Detailed Solution

The correct answer is Hacktivist

Key Points

  1. White hats are ethical hackers who help organizations identify and fix vulnerabilities in their systems.
  2. Black hats are malicious hackers who break into computer systems for personal gain, like stealing data or causing damage.
  3. Grey hats operate in a middle ground, sometimes using their hacking skills for good but also for personal gain.
  4. Hacktivists, on the other hand, are specifically motivated by political or social causes. They use hacking techniques to raise awareness, disrupt operations, or leak information to promote their agenda.

Cyber Security and Emerging Technologies Question 2:

Kaspersky, McAfee, Norton, etc. are popular examples of : 

  1. Anti Viruses
  2. Trojan Horses
  3. Spam Viruses
  4. Worm Viruses
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : Anti Viruses

Cyber Security and Emerging Technologies Question 2 Detailed Solution

The correct answer is option 1: Anti Viruses

Key Points

Kaspersky, McAfee, Norton, and similar software are well-known antivirus programs designed to detect, prevent, and remove malicious software such as viruses, trojans, worms, and spyware. They provide real-time protection, scanning, and quarantine features to keep systems safe from cyber threats.

Explanation of options:

  • Option 1 – Anti Viruses: ✅ Correct. These are security programs designed to fight against malicious software.
  • Option 2 – Trojan Horses: ❌ These are types of malware, not antivirus software.
  • Option 3 – Spam Viruses: ❌ Spam is related to unwanted emails, and this is not a standard term.
  • Option 4 – Worm Viruses: ❌ Worms are a type of virus, not antivirus software.

Hence, the correct answer is: option 1: Anti Viruses

Cyber Security and Emerging Technologies Question 3:

The punishment for Cyber Terrorism in Information Technology Act is ________. 

  1. 1 crore rupees penalty
  2. 6 year imprisonment 
  3. Life Imprisonment
  4. 10 year imprisonment
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : Life Imprisonment

Cyber Security and Emerging Technologies Question 3 Detailed Solution

The correct answer is Life Imprisonment.

Key Points

  • In the Information Technology Act, the penalty for Cyber Terrorism is life imprisonment.
  • Anyone who commits or conspires to commit cyber terrorism will face prison time, which could last a lifetime.

Additional Information

  • Section 66 F of the Indian Information Technology Amendment Act of 2008
    • It includes a provision addressing cyber terrorism.
    • It addresses 'denial of access, unauthorized access, introduction of computer contaminant causing harm to persons, property, critical infrastructure, and supply disruption.
    • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.

Cyber Security and Emerging Technologies Question 4:

A ______ replicates itself by creating its own copies, in order to bring the network to the halt.

  1. Trojan
  2. Worm
  3. Spyware
  4. Logic bomb
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : Worm

Cyber Security and Emerging Technologies Question 4 Detailed Solution

The correct answer is Worm.

Key Points

  • Worms are programs that are developed to infiltrate legitimate data processing programs and alter or destroy the data.
  • They spread through different network connections. Once they are active, they behave like a virus and perform many disruptive actions.
  • Worms replicate themselves by creating their own copies, to bring the network to the halt. Hence option 2 is correct.
  • To replicate themselves, worms use network mediums such as network mail facilities in which a worm can mail a copy of itself to other systems.
  • Similar to viruses, worms tend to fill the computer memory with useless data thereby restricting the users from working.

Additional Information

  • A Trojan horse is a malicious program that appears to be legal but it does destroy the data in the computer and it does not replicate itself.
    • But it opens the way for malicious software like viruses to enter the system.
  • A logic bomb is a program or a part of a program that is dormant until a specific part of the program's logic is activated. 
    • For example, the logic bomb periodically checks the date and once the specific date is reached it gets activated and performs its operation like a system crash.

Cyber Security and Emerging Technologies Question 5:

Which of the following is not a type of cloud firewall?

1) Software-as-a-Service firewall

2) Network-as-a-Service firewall.

3) Security-as-a-Service firewall

4) Firewall-as-a-Service

  1. 1
  2. 3
  3. 4
  4. 2
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : 2

Cyber Security and Emerging Technologies Question 5 Detailed Solution

The correct answer is a Network-as-a-Service firewall(4).

Key Points

  • Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) are the three main services of cloud computing provided by a third party.
  • Similar to regular firewalls, cloud firewalls prevent malicious attacks, and regulate network traffic. But these are deployed or hosted in the cloud which eliminates the need for an infrastructure which takes physical space.
  • There are two types of cloud firewalls namely SaaS firewalls and Next-Generation firewalls.
  • The SaaS firewalls are deployed on the cloud which works very similarly to traditional firewalls. This is in turn classified into different types:
  • Some third-party companies provide firewalls as Security-as-a-Service for which the customers have to pay monthly or yearly for subscriptions. 
  • Firewall-as-a-Service adopts the functionality of a Next-generation firewall (NGFW) and moves it from a physical appliance to the cloud.
  • So, there is nothing like Network-as-a-Service. Hence option 2 is correct.

Additional Information

  • Next-Generation Firewalls or NGFW are deployed in the data centres which protect the systems against modern threats like advanced malware.
  • It has the ability to filter packets based on applications and analyze the data contained in the packets.
  • If there are multiple entry and exit points in an organization, and if the firewall is implemented at any one of them, then it cannot regulate the incoming and outgoing network traffic.

Top Cyber Security and Emerging Technologies MCQ Objective Questions

Which of the following is a type of cyber attack that involves tricking users into revealing sensitive information?

  1. Phishing attack
  2. SQL Injection attack
  3. DOS attack
  4. None of the above

Answer (Detailed Solution Below)

Option 1 : Phishing attack

Cyber Security and Emerging Technologies Question 6 Detailed Solution

Download Solution PDF

The correct answer is Option 1.

Key Points

Phishing

  • It is cyber-attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email.
  • It is a type of cyber attack that involves tricking users into revealing sensitive information. Hence, Option 1 is correct.
  • The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine.
  • The first phishing lawsuit was filed in 2004 against a Californian teenager who created the imitation of the website “America Online”. With this fake website, he was able to gain sensitive information from users and access their credit card details to withdraw money from their accounts.
  • Other than email and website phishing, there’s also 'vishing' (voice phishing), 'smishing' (SMS Phishing), and several other phishing techniques cybercriminals are constantly coming up with. 

Additional Information

SQL Injection (SQLi)

  • It is a type of injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. 

DOS attack

  • A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning.

______ is malicious software that alters the regular functionality of an OS, takes full control on the targeted system and acts as the system administrator on the victim's system.

  1. Virus
  2. Spyware
  3. Trojan horse
  4. Rootkit

Answer (Detailed Solution Below)

Option 4 : Rootkit

Cyber Security and Emerging Technologies Question 7 Detailed Solution

Download Solution PDF

The correct answer is option 4.

Key Points 

  • Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware, or rootkits.
  • Rootkit: A rootkit is a malicious software that modifies the ordinary operation of an operating system on a computer invisibly. The alteration allows the hacker to get complete control of the machine, and the hacker operates as the victim's system administrator. Almost all rootkits are designed to remain undetected.

Hence the correct answer is Rootkit.

Additional Information

  •  A Trojan Horse Virus is a sort of malware that infiltrates a computer while masquerading as genuine software. Typically, an attacker will employ social engineering to embed harmful code within genuine software in order to acquire system access with their program.
  • Spyware is a kind of harmful software, often known as malware, that is placed on a computer without the end user's knowledge. It infiltrates the device, obtains sensitive information and internet usage statistics, and then sends it to advertising, data corporations, or other users.

The feature(s) of cyber security is/are:  

  1. Compliance
  2. Defence against internal threats
  3. Threat prevention
  4. All of the above

Answer (Detailed Solution Below)

Option 4 : All of the above

Cyber Security and Emerging Technologies Question 8 Detailed Solution

Download Solution PDF

The correct answer is All of the above

Key PointsFeatures of cyber security:

  • Compliance: Utilizes passwords, biometric data, and other forms of user identification to verify identity.
  • Encryption: Converts sensitive data into coded language to prevent unauthorized access.
  • Firewalls: Shields network systems from potential threats by monitoring and controlling incoming and outgoing network traffic.
  • Intrusion Detection System (IDS): Monitors network traffic to identify malicious activities.
  • Anti-malware Protection: Protects systems from malware such as viruses, ransomware, and spyware.
  • Secure Sockets Layer (SSL): Establishes an encrypted link between a web server and a browser, securing data transfer.
  • Defence against internal threats​: Provides real-time analysis of security alerts.
  • Multi-factor Authentication (MFA) for Threat Prevention: Requires multiple methods of verification to ensure identity.
  • Data Loss Prevention (DLP): Prevents sensitive data from leaving the secure network.
  • Incident Response: Plans and manages response to a security breach or attack.
  • Regular Updates: Patches and updates to secure against known vulnerabilities.
  • Network Segmentation: Splits networks into separate parts to limit attack surfaces and improve performance.
  • User and Entity Behavior Analytics (UEBA): Detects abnormal behavior or anomalies in networks.
  • Privacy by Design: Integrates data protection from the onset of the system design.
  • Security Awareness Training: Equips users with knowledge to recognize and avoid cyber threats.

What is the purpose of a firewall in cyber security?

  1. To allow unrestricted access to a network
  2. To block unauthorized access to a network
  3. To create a backup of a network's data
  4. None of the above

Answer (Detailed Solution Below)

Option 2 : To block unauthorized access to a network

Cyber Security and Emerging Technologies Question 9 Detailed Solution

Download Solution PDF

The correct answer is Option 2.

Key PointsFirewall

  • It is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
  • The purpose of a Firewall is to establish a barrier between your internal network and incoming traffic from external sources in order to block malicious traffic like viruses and hackers. Hence, Option 2 is correct.

Additional Information

  • Firewalls are commonly used to help prevent unauthorized access to both company and home networks.
  • Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet.
  • Hardware firewalls are found on most network routers and can be configured through the router setup screen.

Under Section 66F of the Information Technology Act 2000, what is the penalty for "Acts of cyber terrorism" offence?

  1. Imprisonment up to fifteen years or/and fine up to ₹ 15,00,000
  2. Imprisonment up to life
  3. Imprisonment up to five years or/and fine up to ₹ 1,000,000
  4. Imprisonment up to five years or/and fine up to ₹ 5,00,000

Answer (Detailed Solution Below)

Option 2 : Imprisonment up to life

Cyber Security and Emerging Technologies Question 10 Detailed Solution

Download Solution PDF

The correct answer is Imprisonment up to life.

Key Points

  • A person can face life imprisonment if he/she denies authorized personnel access to the computer resource or attempts to penetrate/access a computer resource without authorization, with an aim to threaten the unity, integrity, security, or sovereignty of the nation.
  • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.

What does data encryption involve?

  1. Encoding data into a secret code
  2. Converting data into a human-readable format 
  3. Compressing data to save storage space
  4. Deleting data permanently from storage

Answer (Detailed Solution Below)

Option 1 : Encoding data into a secret code

Cyber Security and Emerging Technologies Question 11 Detailed Solution

Download Solution PDF

The correct answer is Encoding data into a secret code.

Key PointsData Encryption:

  • Data encryption is the process of converting plain text into encoded, unreadable data (secret code) to protect it from unauthorized access.
  • It is used to secure sensitive information, such as financial transactions, personal data, and confidential communications.
  • Encryption algorithms use mathematical formulas to scramble the data, making it unreadable without the proper decryption key.
  • The most common encryption methods include symmetric key encryption, asymmetric key encryption, and hashing algorithms.
  • Symmetric key encryption uses a single key to both encrypt and decrypt the data, while asymmetric key encryption uses a pair of keys (public and private) for encryption and decryption.
  • Hashing algorithms create a unique digital fingerprint of the data, which can be used to verify its integrity but cannot be reversed to reveal the original data.
  • Encryption can be applied to various forms of data, including files, emails, messages, and network traffic.
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols that use encryption to secure communication over the internet.
  • End-to-end encryption ensures that only the sender and recipient can access the encrypted data, even if it is transmitted through third-party servers.
  • Data encryption helps organizations comply with data protection regulations and standards, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).
  • Quantum encryption is a cutting-edge method that uses the principles of quantum mechanics to secure data against future quantum computing threats.
  • Encryption keys should be carefully managed and protected to prevent unauthorized access to the encrypted data.
  • Decryption requires the correct key or password, without which the encrypted data remains unreadable.
  • Encryption can be used in combination with other security measures, such as access controls, firewalls, and intrusion detection systems, to create a layered defense against cyber threats.

 

Which of the following is an example of popular antivirus? 

  1. Encrypted virus
  2. Sasser
  3. Worms
  4. Bitdefender

Answer (Detailed Solution Below)

Option 4 : Bitdefender

Cyber Security and Emerging Technologies Question 12 Detailed Solution

Download Solution PDF

The correct answer is Bitdefender

Antivirus software deals with the security of a computer system.

Key Points

  • Antivirus software, or anti-virus software, is also known as anti-malware.
  • It is a computer program used to prevent, detect, and remove malware.
  • Various important Antivirus:
    • Bitdefender Antivirus Plus. Well, rounded everyday antivirus protection.
    • Norton AntiVirus Plus. Smooth protection for your system.
    • Avira Antivirus Pro.
    • F-Secure Antivirus SAFE.
    • Kaspersky Anti-Virus.
    • Trend Micro Antivirus+ Security. 
    • Webroot SecureAnywhere AntiVirus. 
    • ESET NOD32 Antivirus.

 

Additional Information 

  • Worms
    • A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.
  • Sasser
    • Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.

Which of the following languages is suitable for artificial intelligence?

  1. Fortran
  2. Basic
  3. Prolog
  4. 'C'

Answer (Detailed Solution Below)

Option 3 : Prolog

Cyber Security and Emerging Technologies Question 13 Detailed Solution

Download Solution PDF

The Correct Answer: Prolog is a general-purpose programming language associated with artificial intelligence and computational linguistics.

  • All of the listed languages can be used to implement some form of AI, but each one is suitable for different aspects of AI.

Key Points

  • Fortran: It's an old language typically used for numerical and scientific computing. It's not commonly used for modern AI applications but can still be used if necessary, especially for tasks that require heavy numerical computations.
  • Basic: It's a beginner-friendly language. Though it's not typically used for AI applications due to the lack of advanced data structures and libraries, it can be used to implement simple AI systems.
  • Prolog: It's a logic programming language often associated with AI, especially in the domain of expert systems, natural language processing, and knowledge representation. It supports pattern matching and automatic backtracking, which are powerful for these types of tasks.
  • 'C': It's a low-level, general-purpose language. It can be used for AI development, but it might not be the most efficient choice. It lacks the high-level abstractions and libraries (such as TensorFlow or PyTorch) that Python provides, which are commonly used in AI.

Out of these options, Prolog is likely the most directly associated with AI.

Additional InformationHowever, it should be noted that in current AI development, Python is by far the most widely used language due to its simplicity, flexibility, and the broad ecosystem of AI and machine learning libraries available. Other languages like Java, R, and Julia are also often used.

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

  1. IP tracker
  2. emails
  3. websites
  4. web pages

Answer (Detailed Solution Below)

Option 3 : websites

Cyber Security and Emerging Technologies Question 14 Detailed Solution

Download Solution PDF
The correct answer is websites

Key Points

  • Websites are commonly targeted by cyber attackers to fetch the IP addresses of target or victim users.
  • Attackers often use techniques such as phishing, social engineering, or malicious scripts embedded in websites to obtain IP addresses.
  • Once an IP address is obtained, it can be used to gather more information about the target, such as their location, internet service provider, and potential vulnerabilities.
  • This information can then be used for further attacks, including Distributed Denial of Service (DDoS) attacks, hacking attempts, or other malicious activities.

Additional Information

  • Emails and web pages are also potential sources of IP addresses, but websites are more frequently used by attackers due to the higher volume of traffic and interactions.
  • Users should be cautious when visiting unknown websites or clicking on suspicious links to protect their IP address and personal information.
  • Using VPNs or proxy servers can help mask a user's real IP address, providing an additional layer of security.

Which of the following is an example of popular antivirus?

  1. Bitdefender
  2. Worms
  3. Sasser
  4. Encrypted virus

Answer (Detailed Solution Below)

Option 1 : Bitdefender

Cyber Security and Emerging Technologies Question 15 Detailed Solution

Download Solution PDF

option 1) is correct answ

Antivirus software deals with the security of a computer system.

Key Points

  • Antivirus software, or anti-virus software, is also known as anti-malware.
  • It is a computer program used to prevent, detect, and remove malware.
  • Various important Antivirus:
    • Bitdefender Antivirus Plus. Well, rounded everyday antivirus protection.
    • Norton AntiVirus Plus. Smooth protection for your system.
    • Avira Antivirus Pro.
    • F-Secure Antivirus SAFE.
    • Kaspersky Anti-Virus.
    • Trend Micro Antivirus+ Security. 
    • Webroot SecureAnywhere AntiVirus. 
    • ESET NOD32 Antivirus.

 

Additional Information 

Worms

A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance.

Sasser

Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable port.

Get Free Access Now
Hot Links: online teen patti teen patti plus teen patti master apk download