Information Security MCQ

Below Information Security quiz are Multiple Choice Questions (MCQs) type Quiz. These Information Security MCQ Questions helps you to refresh your Information Security, you can see the correct option by clicking on it. .
  • 1. Which is an example of PII? (Personally Identifiable Information)

    • Credit Card Number
    • Name
    • Home Address
    • All of the above
  • 2. Which of the following helps provide confidentiality to data?

    • A secure password
    • Encryption
    • Nonrepudiation
    • Antimalware
  • 3. Which of the following four passwords is the most secure?

    • Boat123
    • WTh!5Z
    • into*48
    • 123456
  • 4. What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?

    • Use of insecure Wi-Fi networks
    • Key-Logging
    • De-anonymization by network operators
    • Phishing attacks
  • 5. A cookie that remains until an expiration date is met is:

    • session cookie
    • secure cookie
    • persistent cookie
    • super cookie
  • 6. Self-replicating malware is known as a ____.

    • rootkit
    • worm
    • macro virus
    • logic bomb
  • 7. What does a Trojan Horse do?

    • Makes the computer stop working
    • Attaches inside of program
    • Gets full access
    • Gets full access
  • 8. What is spyware?

    • Malware that collects information about you without your consent or knowledge.
    • A program that looks through you laptop camera and allows your FBI Agent to see you.
    • A program that allows you to become a better spy and gives you tools to spy on your friends.
  • 9. Which of the following statements is true of defenders of belief?

    • Their communities do not facilitate activities like sales and marketing.
    • They seek conformity and want to convince others of the wisdom of their opinions.
    • They are effective for activities that involve innovation and problem solving.
    • When confronted with contrary evidence, they change their opinion.
  • 10. What does compliance mean?

    • providing secure access to user data
    • using honest means to bypass security measures
    • conducting tests to identify vulnerabilities in a system
    • following the rules or standards that have been established