Internet, Cybersecurity & Data Science MCQs With Answer
The primary function of a firewall in cybersecurity is to:
a) Block viruses
b) Monitor network traffic
c) Prevent unauthorized access
d) Encrypt data
Which of the following is an example of two-factor authentication (2FA)?
a) Password only
b) PIN only
c) Password and OTP (One-Time Password)
d) Username only
Which of the following is NOT a type of cyber attack?
a) Phishing
b) DDoS
c) SQL Injection
d) Cloud Computing
What does VPN stand for?
a) Virtual Private Network
b) Verified Personal Network
c) Virtual Processing Node
d) Variable Packet Number
Which protocol is used for secure communication over the Internet?
a) HTTP
b) FTP
c) SSH
d) Telnet
What is a common technique used in phishing attacks?
a) Sending legitimate emails
b) Sending deceptive emails with malicious links
c) Installing antivirus software
d) Using strong passwords
Which type of malware encrypts files and demands a ransom for decryption?
a) Virus
b) Worm
c) Ransomware
d) Spyware
What is the purpose of a CAPTCHA?
a) To slow down a website
b) To verify human users and prevent bots
c) To improve website design
d) To encrypt data
Which programming language is commonly used in data science?
a) HTML
b) Python
c) CSS
d) PHP
What does “Big Data” refer to?
a) Large-sized computer files
b) Huge volumes of data that require advanced processing
c) A type of cyber attack
d) A new programming language
Which database management system is commonly used in data science?
a) MySQL
b) Photoshop
c) Excel
d) Illustrator
What is the main purpose of machine learning in data science?
a) To manually program responses
b) To allow systems to learn from data without being explicitly programmed
c) To delete unnecessary data
d) To store large data files
Which of the following is NOT a cybersecurity best practice?
a) Using strong passwords
b) Avoiding public Wi-Fi
c) Clicking on unknown email links
d) Keeping software updated
What does HTTPS stand for?
a) Hyper Transfer Text Secure
b) Hyper Text Transfer Secure
c) Hyper Text Transfer Protocol Secure
d) High Transfer Text Secure
What type of cyber attack involves overwhelming a server with traffic?
a) Ransomware
b) DDoS (Distributed Denial of Service)
c) Phishing
d) Spyware
Which of the following is NOT a data structure used in data science?
a) Array
b) Linked List
c) Stack
d) Firewall
What is the role of an antivirus program?
a) To make the computer faster
b) To detect and remove malware
c) To update software
d) To clean disk space
Which of the following is an example of biometric authentication?
a) Password
b) CAPTCHA
c) Fingerprint scan
d) Security question
What is the main purpose of encryption?
a) To store data
b) To secure data from unauthorized access
c) To delete unwanted files
d) To create strong passwords
Which of the following is NOT a type of network topology?
a) Star
b) Mesh
c) Circular
d) Bus
What is the main use of cloud computing?
a) Storing and accessing data over the internet
b) Playing video games
c) Watching online videos
d) Browsing the web
Which technology is used for data analysis in business intelligence?
a) Virtual Reality
b) Artificial Intelligence
c) Social Media
d) Video Editing
Which of the following is an open-source programming language used in data science?
a) Java
b) Python
c) Swift
d) C#
What is the role of a data scientist?
a) Designing websites
b) Analyzing and interpreting complex data
c) Fixing hardware issues
d) Developing mobile apps
Which of the following is a strong password example?
a) password123
b) qwerty
c) Tr@vel#20!
d) 123456
Which of the following is an example of social engineering?
a) SQL injection
b) Tricking users into revealing personal information
c) Encrypting files
d) Installing software updates
What does IoT stand for in cybersecurity?
a) Internet of Things
b) Information of Technology
c) Intelligent Operating Team
d) Integrated Online Tracking
Which of the following is NOT an operating system?
a) Windows
b) Linux
c) Python
d) macOS
Which of the following is a major risk in public Wi-Fi?
a) Faster internet
b) Secure connection
c) Risk of hacking
d) Unlimited data usage
What does SQL stand for?
a) Structured Query Language
b) Secure Quality Language
c) System Query Language
d) Standard Query Logic