250+ TOP MCQs on Cyber Security Types – Windows Security

Cyber Security Multiple Choice Questions on “Cyber Security Types – Windows Security”.

1. __________ passwords are next level of security.
a) BIOS
b) CMOS
c) SMOS
d) BOIS

Answer: a
Clarification: BIOS passwords are next level of security where the password is set in the CMOS (which is a tiny battery) chip on the motherboard, which keeps on running even after the PC is turned off.

2. BIOS is abbreviated as _______________
a) Basic Input Output Server
b) Basic Internet Output Systems
c) Basic Input Output System
d) Battery-based Input Output System

Answer: c
Clarification: BIOS (Basic Input Output System) passwords are next level of security. BIOS is an essential part of your system & comes with it as you bring the computer home where the password gets stored in CMOS which keeps on running even after the PC gets shut down.

3. Most computers have BIOS which can be configured so that it can ask for a password once the system starts.
a) True
b) False

Answer: a
Clarification: Most computers have BIOS which can be configured so that it can ask for a password once the system starts. It is the next level of security where the password is set in the CMOS.

4. Find out, select & uninstall all ________________ programs from your computer.
a) useful
b) pre-installed
c) unwanted
d) utility

Answer: c
Clarification: Find out, select & uninstall all unwanted programs from your computer to maintain security. At times, there are some programs that get installed with useful applications as separate programs or as complementary programs. If you’re not using those programs or don’t know about their usage and from where they came, it can be a malware also.

5. As a backup for securing your device, it is necessary to create a _____________
a) backup point
b) copy of files in separate drives
c) copy of files in the same drives
d) restore point

Answer: d
Clarification: As a backup for securing your device, it is necessary to create a restore point so that you can roll-back all the changes and programs installed by restoring the system to the state before those changes.

6. The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.
a) Windows Security Essentials
b) Windows Firewall
c) Windows app blocker
d) Windows 10

Answer: b
Clarification: The Windows Firewall is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.

7. _____________ are essential because they frequently comprises of critical patches to security holes.
a) System software
b) Utility Software
c) Software executables
d) Software updates

Answer: d
Clarification: Software updates are essential because they frequently comprise critical patches to security holes. In fact, a lot of harmful malware attacks can be stopped with official updates from vendors.

8. The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference.
a) system, administrator
b) system, user
c) group, user
d) user, administrator

Answer: a
Clarification: The system account and the administrator account have the same file privileges, but their working and functionalities have a difference. Actually, the system account is used by the OS & by services which run under Windows. And, administrator account gives the user full control to their files, directories, services.

9. ________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware.
a) Norton Antivirus
b) Windows Defender
c) Anti-malware
d) Microsoft Security Essentials

Answer: b
Clarification: Windows Defender is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware. It comes built-in with Windows 8 & Windows 10.

10. ____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose.
a) MS Windows Defender
b) MSE
c) BitLocker
d) MS Office

Answer: c
Clarification: BitLocker is an application which now comes as built-in Windows OS and it allows Windows users to encrypt all drives for |security purpose. It checks for TPM status whether activated or not.

11. A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication.
a) Trusted Platform Mode
b) Trusted Protocol Module
c) Trusted Privacy Module
d) Trusted Platform Module

Answer: d
Clarification: A Trusted Platform Module is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication.

12. TPM is abbreviated as ____________
a) Trusted Platform Mode
b) Trusted Platform Module
c) Trusted Privacy Module
d) True Platform Module

Answer: b
Clarification: Port knocking is quite an esoteric process for preventing session creation through a particular port. Port knocking is not presently used by default in any stack, but soon patches will come to allow the use of knocking protocols.

Leave a Reply

Your email address will not be published. Required fields are marked *