CCC Objective Question Answer Hindi| CCC MCQs With PDF

नमस्कार साथियों आज की इस पोस्ट में हमने आप सभी के लिए CCC Exam में आने वाले कुछ अति महत्वपूर्ण CCC Exam Question को शामिल किया है | साथियों यह सभी CCC Objective Question आपकी होने वाली CCC Exam के लिए अति उपयोगी होगे |

CCC Objective Exam Question in Hindi with PDF आप www.cccwifistudy.com पर पढ़ रहे है|

CCC Objective Question in Hind with PDF

 

1. What is the primary purpose of encryption?एन्क्रिप्शन का प्राथमिक उद्देश्य क्या है?
a. To speed up data processing
b. To make data unreadable to unauthorized users
c. To backup data
d. To increase storage capacity

View Answer

c. To make data unreadable to unauthorized users

2. Which of the following is a type of malware designed to replicate and spread itself? निम्नलिखित में से कौन सा एक प्रकार का मैलवेयर है जिसे स्वयं को दोहराने और फैलाने के लिए डिज़ाइन किया गया है?
a. Virus
b. Trojan
c. Worm
d. Ransomware

View Answer

c. Worm

3. What does a firewall primarily protect against? फ़ायरवॉल मुख्य रूप से किससे सुरक्षा प्रदान करता है?
a. Physical theft
b. Unauthorized network access
c. Software bugs
d. Data loss

View Answer

b. Unauthorized network access

4. What is the primary purpose of a VPN (Virtual Private Network)? वीपीएन (वर्चुअल प्राइवेट नेटवर्क) का प्राथमिक उद्देश्य क्या है?
a. To enhance user interface
b. To secure internet connections and protect privacy
c. To increase internet speed
d. To manage email accounts

View Answer

b. To secure internet connections and protect privacy

5. Which security model is based on the principle of least privilege? कौन सा सुरक्षा मॉडल न्यूनतम विशेषाधिकार के सिद्धांत पर आधारित है?
a. Bell-LaPadula Model
b. Biba Model
c. Clark-Wilson Model
d. Access Control Lists (ACLs)

View Answer

d. Access Control Lists (ACLs)

6. What does DDoS stand for? DDoS का क्या अर्थ है?
a. Distributed Denial of Service
b. Direct Denial of Service
c. Distributed Data Operation System
d. Direct Data Operation Service

View Answer

a. Distributed Denial of Service

7. Which of the following is an example of social engineering? निम्नलिखित में से कौन सोशल इंजीनियरिंग का उदाहरण है?
a. Phishing email
b. SQL Injection
c. Cross-site scripting
d. Buffer overflow

View Answer

a. Phishing email

8. What does the term “zero-day exploit” refer to? “शून्य-दिन शोषण” शब्द का तात्पर्य क्या है?
a. A type of malware that activates every day
b. A vulnerability that has been known for 0 days
c. An exploit that takes advantage of a vulnerability before it is patched
d. A software patch released every day

View Answer

c. An exploit that takes advantage of a vulnerability before it is patched

9. Which protocol is used for secure communication over the internet? इंटरनेट पर सुरक्षित संचार के लिए किस प्रोटोकॉल का उपयोग किया जाता है?
a. HTTP
b. FTP
c. HTTPS
d. POP3

View Answer

a. HTTP

10. What is the purpose of a digital signature? डिजिटल हस्ताक्षर का उद्देश्य क्या है?
a. To confirm the sender’s identity and ensure message integrity
b. To encrypt data
c. To perform data backup
d. To increase email storage capacity

View Answer

a. To confirm the sender’s identity and ensure message integrity

11. Which of the following is used to detect unauthorized changes in files? फ़ाइलों में अनधिकृत परिवर्तनों का पता लगाने के लिए निम्नलिखित में से किसका उपयोग किया जाता है?
a. Intrusion Detection System (IDS)
b. Antivirus Software
c. File Integrity Monitoring (FIM)
d. Network Firewall

View Answer

c. File Integrity Monitoring (FIM)

12. What is multi-factor authentication (MFA)?बहु-कारक प्रमाणीकरण (एमएफए) क्या है?
a. Using multiple passwords for one account
b. A single factor of authentication
c. Using two or more verification methods to access an account
d. A method to increase password complexity

View Answer

c. Using two or more verification methods to access an account

13. What does the acronym “SIEM” stand for in cyber security? साइबर सुरक्षा में “SIEM” का संक्षिप्त रूप क्या है?
a. Security Information and Event Management
b. Security Internet and Endpoint Monitoring
c. Secure Information and Encryption Management
d. System Information and Event Monitoring

View Answer

a. Security Information and Event Management

14. Which type of attack involves intercepting and altering communication between two parties without their knowledge? किस प्रकार के हमले में दो पक्षों की जानकारी के बिना उनके बीच संचार को रोकना और बदलना शामिल है?
a. Phishing
b. Man-in-the-Middle Attack
c. Denial of Service
d. SQL Injection

View Answer

b. Man-in-the-Middle Attack

15. What is the purpose of a penetration test? प्रवेश परीक्षण का उद्देश्य क्या है?
a. To ensure software updates are applied
b. To identify and exploit vulnerabilities in a system
c. To monitor network traffic
d. To create secure passwords

View Answer

b. To identify and exploit vulnerabilities in a system

16. Which of the following is a method used to protect data from unauthorized access? डेटा को अनधिकृत पहुंच से बचाने के लिए निम्नलिखित में से कौन सी विधि का उपयोग किया जाता है?
a. Data masking
b. Data compression
c. Data normalization
d. Data redundancy

View Answer

a. Data masking

17. Which type of attack involves an attacker sending unsolicited messages to a large number of users in order to gain sensitive information? किस प्रकार के हमले में एक हमलावर संवेदनशील जानकारी हासिल करने के लिए बड़ी संख्या में उपयोगकर्ताओं को अनचाहे संदेश भेजता है?
a. Phishing
b. Spoofing
c. Ransom ware
d. Brute-force

View Answer

a. Phishing

18. What is the main purpose of a honey pot in cyber security? साइबर सुरक्षा में हनी पॉट का मुख्य उद्देश्य क्या है?
a. To attract and analyze malicious activities
b. To store sensitive data
c. To provide additional encryption
d. To block unauthorized access

View Answer

a. To attract and analyze malicious activities

19. Which of the following is a common method for mitigating निम्नलिखित में से कौन सा शमन का एक सामान्य तरीका है SQL injection attacks?
a. Using SQL queries
b. Encrypting the database
c. Using prepared statements and parameterized queries
d. Limiting database access

View Answer

c. Using prepared statements and parameterized queries

20. Which type of cyber security attack involves an attacker attempting to guess passwords using automated tools? किस प्रकार के साइबर सुरक्षा हमले में एक हमलावर स्वचालित उपकरणों का उपयोग करके पासवर्ड का अनुमान लगाने का प्रयास करता है?
a. Phishing
b. Social Engineering
c. Brute-force Attack
d. Cross-site Scripting

View Answer

c. Brute-force Attack

21. What does the principle of “Defence in Depth” refer to in cyber security? साइबर सुरक्षा में “गहराई में रक्षा” का सिद्धांत क्या दर्शाता है?
a. Using multiple security measures to protect data
b. Focusing solely on network security
c. Increasing the complexity of encryption algorithms
d. Reducing the number of security controls

View Answer

a. Using multiple security measures to protect data

22. What is a zero-trust security model based on? शून्य-विश्वास सुरक्षा मॉडल किस पर आधारित है?
a. Trusting all internal network traffic
b. Trusting only authenticated users and devices, regardless of their location
c. Blocking all external traffic
d. Encrypting all internal communications

View Answer

b. Trusting only authenticated users and devices, regardless of their location

23. Which term refers to malicious software that holds data hostage until a ransom is paid? कौन सा शब्द दुर्भावनापूर्ण सॉफ़्टवेयर को संदर्भित करता है जो फिरौती का भुगतान होने तक डेटा को बंधक रखता है?
a. Worm
b. Virus
c. Ransom ware
d. Trojan

View Answer

c. Ransom ware

24. What is the purpose of a public key infrastructure (PKI)? सार्वजनिक कुंजी अवसंरचना (पीकेआई) का उद्देश्य क्या है?
a. To manage encryption keys and digital certificates
b. To create strong passwords
c. To monitor network traffic
d. To perform software updates

View Answer

a. To manage encryption keys and digital certificates

25. Which of the following is used to manage and enforce security policies on network devices? नेटवर्क उपकरणों पर सुरक्षा नीतियों को प्रबंधित और लागू करने के लिए निम्नलिखित में से किसका उपयोग किया जाता है?
a. Network Access Control (NAC)
b. Firewall
c. Antivirus
d. Intrusion Prevention System (IPS)

View Answer

a. Network Access Control (NAC)

26. What type of attack involves inserting malicious code into a web application? किस प्रकार के हमले में वेब एप्लिकेशन में दुर्भावनापूर्ण कोड डालना शामिल है?
a. Cross-site Scripting (XSS)
b. Man-in-the-Middle Attack
c. Denial of Service (Does)
d. Phishing

View Answer

a. Cross-site Scripting (XSS)

27. What is the role of an Intrusion Detection System (IDS)? घुसपैठ जांच प्रणाली (आईडीएस) की क्या भूमिका है?
a. To prevent unauthorized access
b. To detect and alert on suspicious activities
c. To encrypt sensitive data
d. To manage network traffic

View Answer

b. To detect and alert on suspicious activities

28. Which term refers to the practice of creating a duplicate of data to prevent data loss? डेटा हानि को रोकने के लिए डेटा की डुप्लिकेट बनाने की प्रथा को कौन सा शब्द संदर्भित करता है?
a. Backup
b. Encryption
c. Archiving
d. Compression

View Answer

c. a. Backup

29. What is the main function of a security patch? सुरक्षा पैच का मुख्य कार्य क्या है?
a. To improve software performance
b. To fix security vulnerabilities in software
c. To add new features
d. To change user interface elements

View Answer

b. To fix security vulnerabilities in software

30. What does “BYOD” stand for in the context of cyber security? साइबर सुरक्षा के संदर्भ में “BYOD” का क्या अर्थ है?
a. Bring Your Own Device
b. Build Your Own Database
c. Backup Your Own Data
d. Backup Your Own Device

View Answer

a. Bring Your Own Device

31. Which of the following is a form of biometric authentication?
a. Password
b. Security Token
c. Finger
d. Voice recognition

View Answer

c. Finger

DOWLOAD PDF

Read other Most Imp Question-Answer

More Test –

CCC Mock Test -1

CCC Mock Test -2

CCC Mock Test -3

CCC Mock Test -4

 

Leave a Reply