Everyday Science

Internet, Cybersecurity & Data Science MCQs With Answer

The primary function of a firewall in cybersecurity is to:
a) Block viruses
b) Monitor network traffic
c) Prevent unauthorized access
d) Encrypt data

Answer
c) Prevent unauthorized access

Which of the following is an example of two-factor authentication (2FA)?
a) Password only
b) PIN only
c) Password and OTP (One-Time Password)
d) Username only

Answer
c) Password and OTP (One-Time Password)

Which of the following is NOT a type of cyber attack?
a) Phishing
b) DDoS
c) SQL Injection
d) Cloud Computing

Answer
d) Cloud Computing

What does VPN stand for?
a) Virtual Private Network
b) Verified Personal Network
c) Virtual Processing Node
d) Variable Packet Number

Answer
a) Virtual Private Network

Which protocol is used for secure communication over the Internet?
a) HTTP
b) FTP
c) SSH
d) Telnet

Answer
c) SSH

What is a common technique used in phishing attacks?
a) Sending legitimate emails
b) Sending deceptive emails with malicious links
c) Installing antivirus software
d) Using strong passwords

Answer
b) Sending deceptive emails with malicious links

Which type of malware encrypts files and demands a ransom for decryption?
a) Virus
b) Worm
c) Ransomware
d) Spyware

Answer
c) Ransomware

What is the purpose of a CAPTCHA?
a) To slow down a website
b) To verify human users and prevent bots
c) To improve website design
d) To encrypt data

Answer
b) To verify human users and prevent bots

Which programming language is commonly used in data science?
a) HTML
b) Python
c) CSS
d) PHP

Answer
b) Python

What does “Big Data” refer to?
a) Large-sized computer files
b) Huge volumes of data that require advanced processing
c) A type of cyber attack
d) A new programming language

Answer
b) Huge volumes of data that require advanced processing

Which database management system is commonly used in data science?
a) MySQL
b) Photoshop
c) Excel
d) Illustrator

Answer
a) MySQL

What is the main purpose of machine learning in data science?
a) To manually program responses
b) To allow systems to learn from data without being explicitly programmed
c) To delete unnecessary data
d) To store large data files

Answer
b) To allow systems to learn from data without being explicitly programmed

Which of the following is NOT a cybersecurity best practice?
a) Using strong passwords
b) Avoiding public Wi-Fi
c) Clicking on unknown email links
d) Keeping software updated

Answer
c) Clicking on unknown email links

What does HTTPS stand for?
a) Hyper Transfer Text Secure
b) Hyper Text Transfer Secure
c) Hyper Text Transfer Protocol Secure
d) High Transfer Text Secure

Answer
c) Hyper Text Transfer Protocol Secure

What type of cyber attack involves overwhelming a server with traffic?
a) Ransomware
b) DDoS (Distributed Denial of Service)
c) Phishing
d) Spyware

Answer
b) DDoS (Distributed Denial of Service)

Which of the following is NOT a data structure used in data science?
a) Array
b) Linked List
c) Stack
d) Firewall

Answer
d) Firewall

What is the role of an antivirus program?
a) To make the computer faster
b) To detect and remove malware
c) To update software
d) To clean disk space

Answer
b) To detect and remove malware

Which of the following is an example of biometric authentication?
a) Password
b) CAPTCHA
c) Fingerprint scan
d) Security question

Answer
c) Fingerprint scan

What is the main purpose of encryption?
a) To store data
b) To secure data from unauthorized access
c) To delete unwanted files
d) To create strong passwords

Answer
b) To secure data from unauthorized access

Which of the following is NOT a type of network topology?
a) Star
b) Mesh
c) Circular
d) Bus

Answer
c) Circular

What is the main use of cloud computing?
a) Storing and accessing data over the internet
b) Playing video games
c) Watching online videos
d) Browsing the web

Answer
a) Storing and accessing data over the internet

Which technology is used for data analysis in business intelligence?
a) Virtual Reality
b) Artificial Intelligence
c) Social Media
d) Video Editing

Answer
b) Artificial Intelligence

Which of the following is an open-source programming language used in data science?
a) Java
b) Python
c) Swift
d) C#

Answer
b) Python

What is the role of a data scientist?
a) Designing websites
b) Analyzing and interpreting complex data
c) Fixing hardware issues
d) Developing mobile apps

Answer
b) Analyzing and interpreting complex data

Which of the following is a strong password example?
a) password123
b) qwerty
c) Tr@vel#20!
d) 123456

Answer
c) Tr@vel#20!

Which of the following is an example of social engineering?
a) SQL injection
b) Tricking users into revealing personal information
c) Encrypting files
d) Installing software updates

Answer
b) Tricking users into revealing personal information

What does IoT stand for in cybersecurity?
a) Internet of Things
b) Information of Technology
c) Intelligent Operating Team
d) Integrated Online Tracking

Answer
a) Internet of Things

Which of the following is NOT an operating system?
a) Windows
b) Linux
c) Python
d) macOS

Answer
c) Python

Which of the following is a major risk in public Wi-Fi?
a) Faster internet
b) Secure connection
c) Risk of hacking
d) Unlimited data usage

Answer
c) Risk of hacking

What does SQL stand for?
a) Structured Query Language
b) Secure Quality Language
c) System Query Language
d) Standard Query Logic

Answer
a) Structured Query Language

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button