Cyber Security MCQs and Answers

Cyber security protects internet-connected systems including hardware, software, and program or data from cyber attacks. 

The word cyber security is divided into two words:

  • Cyber: It denotes the computer, system, network, program, or data
  • Security: It denotes system security, network security, program, or data security.

Need for cyber security:

  • To protect private data
  • To protect intellectual data
  • To protect banking or financial data
  • National security
  • Global economy
  • Protect sensitive data

Information System

An information system is a software that helps organize and analyze data.

Information system components:

  • System resource:
    • People:
      • Is specialist
      • Is end-user
    • Software
    • Data
    • Network
  • System activity:
    • Input
    • Storage
    • Processes
    • Output
    • Control and maintenance

Development of information systems:

The development of information systems is similar to the application development process. It has various approaches. You can follow any of the following requirements.

  • Classical waterfall model
  • Prototyping model
  • Spiral model
  • Incremental model

Cyber Security MCQs

1. 

Which of the following is considered an element of cyber security?

Network security

Operational security

Application security

All of the above

2. 

Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt information.

SHA

MD5

RC4

Blowfish

3. 

Identify which of the following can be considered instances of Open design.

DVD Player

CSS

Only B

Both A and B

4. 

In which category does compromising confidential information fall?

Threat

Bug

Attack

Vulnerability

5. 

In which category does the lack access control policy fall?

Threat

Bug

Attack

Vulnerability

6. 

Malware stands for?

Multipurpose software

Malfunctioned software

Malicious software

Malfunctioning of security

7. 

PCT stands for _____

Private Communication Technique

Private Connecting Technology

Private Communication Technology

Personal Communication Technology

8. 

State whether True or False: Data encryption is primarily used to ensure confidentiality.

True

False

Cannot be interpreted

None

9. 

The most common way to maintain data availability?

Data clustering

Data Altering

Data Backup

Data Recovery

10. 

To what does a DNS translate a domain name

Hex

IP

Binary

URL

11. 

Total types of scanning in cyber security is?

1

2

3

4

12. 

What is the CIA triad also known as?

AIC(Availability, Integrity, Confidentiality)

NIC(Non-repudiation, Integrity, Confidentiality)

AIN(Availability, Integrity, Non-repudiation)

ANC(Availability, Non-repudiation, Confidentiality)

13. 

What is transformed using cipher algorithms?

Scalar text

Complex text

Plain text

None

14. 

Identify the type of attack which uses a fraudulent server with a relay address.

MITM

NTLM

SMB

NetBIOS

15. 

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

16. 

Which of the following is used for encrypting data at the network level?

HTTPS

SMTP

S/MIME

IPSec

17. 

Which of the following is used for monitoring traffic and analyzing network flow?

Managed detection and response

Cloud access security broker

Network traffic analysis

Network security firewall

18. 

Which of the following platforms is used for the safety and protection of information in the cloud?

AWS

Cloud workload protection platforms

Cloud security protocols

One Drive

19. 

Which of the following suite is used for NTP enumeration?

DNS

SNMP

NTP

HTTP

20. 

Which of the following tool is used in Wi-fi hacking?

Aircrack-ng

Wireshark

Norton

None

21. 

Which one of the following can be considered as the class of computer threats?

Dos Attack

Phishing

Soliciting

Both B and C

22. 

Which protocol is mostly used in Wi-fi security?

WPS

WPA

WPA2

Both b and c.

23. 

Which software is mainly used to help users detect viruses and avoid them?

Antivirus

Adware

Malware

None of the above

24. 

Why is Code red?

Antivirus

Virus

Word processing software

Photo editing software

25. 

Why is response and transit time used?

To measure reliability

To measure security

To measure longevity

To measure performance

26. 

Why is the proxy server used by a hacker?

For obtaining remote access connection

Hiding malicious activity on the network

Create a ghost server on the network

Create a stronger connection with the target

27. 

Identify the least strong security encryption.

WPA2

WEP

WPA3

WPA

28. 

CHAP stands for?

Challenge Hardware Authentication Protocols

Circuit Hardware Authentication Protocols

Challenge Handshake Authentication Protocols

Circuit Handshake Authentication Protocols

29. 

Choose among the following techniques, which are used to hide information inside a picture.

Image rendering

Steganography

Rootkits

Bitmapping

30. 

Choose the default port number for Apache and other web servers.

20

27

80

87

31. 

Choose the features which violate cyber security.

Exploit

Attack

Compliance

None

32. 

EDR stands for _____?

Endless detection and response

Endpoint detection and response

Endless detection and recovery

Endpoint detection and recovery

33. 

Full form of TCP/IP?

Transmission Control Protocol/ internet protocol

Transmission Control Protocol/ internet protocol

Transaction Control protocol/ internet protocol

Transmission Contribution protocol/ internet protocol

34. 

Identify among the following which is used to avoid browser-based hacking.

Adware remover in browser

Incognito mode in the browser

Anti-malware in browser

Remote browser access

35. 

Identify the class of computer threats.

Phishing

DOS attack

Soliciting

Both B and C

36. 

Identify the Debian-based OS which has 2 virtual machines and focuses on preserving users’ data.

Ubuntu

Fedora

Whonix

Kubuntu

37. 

Identify the element which is not considered in the triad, according to the CIA.

Authenticity

Availability

Integrity

Confidentiality

38. 

Identify the first computer virus among the following.

Blaster

Creeper

Sasser

Both b and c

39. 

Identify the incorrect type of scanning?

SYN Stealth

Null Scan

Xmas tree Scan

Cloud scan

40. 

Among the following, identify the one which does not need any host program and is independent.

Worm

Virus

Trojan horse

Trap door

41. 

Identify the legal form of hacking.

Cracking

Non-ethical hacking

Ethical hacking

Hacktivism

42. 

Identify the mail transferring methodology which isn’t secured.

SSMTP

S/MIME

POP3

Mail using PGP

43. 

Identify the malware which does not replicate or clone through an infection?

Trojans

Worms

Rootkits

Virus

44. 

Identify the maximum character which Linux OS supports in its file names.

32

64

128

256

45. 

Identify the oldest phone hacking technique used by hackers to make free calls.

Spamming

Phreaking

Cracking

Phishing

46. 

Identify the port used to connect to Active Directory in Windows 2000.

139

445

80

389

47. 

Identify the private search engine.

Bing

Duckduckgo

Google

Yahoo

48. 

Identify the security protocol which is not strong.

SMTP

SSL

SFTP

HTTPS

49. 

Identify the term among the following which is the first phase of ethical hacking.

Footprinting

ARP Poisoning

DNS Poisoning

Enumeration

50. 

Identify the term which denotes that only authorized users are capable of accessing the information

Confidentiality

Availability

Integrity

Non-repudiation

51. 

Identify the term which denotes the protection of data from modification by unknown users.

Confidentiality

Authentication

Integrity

Non-repudiation

52. 

Identify the term which denotes the violation of principle if the computer is no more accessible.

Access control

Availability

Confidentiality

All of the above