Cyber Security MCQs and Answers
Cyber security protects internet-connected systems including hardware, software, and program or data from cyber attacks.
The word cyber security is divided into two words:
- Cyber: It denotes the computer, system, network, program, or data
- Security: It denotes system security, network security, program, or data security.
Need for cyber security:
- To protect private data
- To protect intellectual data
- To protect banking or financial data
- National security
- Global economy
- Protect sensitive data
Information System
An information system is a software that helps organize and analyze data.
Information system components:
- System resource:
- People:
- Is specialist
- Is end-user
- Software
- Data
- Network
- People:
- System activity:
- Input
- Storage
- Processes
- Output
- Control and maintenance
Development of information systems:
The development of information systems is similar to the application development process. It has various approaches. You can follow any of the following requirements.
- Classical waterfall model
- Prototyping model
- Spiral model
- Incremental model
Cyber Security MCQs
Which of the following is considered an element of cyber security?
Network security
Operational security
Application security
All of the above
Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
SHA
MD5
RC4
Blowfish
Identify which of the following can be considered instances of Open design.
DVD Player
CSS
Only B
Both A and B
In which category does compromising confidential information fall?
Threat
Bug
Attack
Vulnerability
In which category does the lack access control policy fall?
Threat
Bug
Attack
Vulnerability
Malware stands for?
Multipurpose software
Malfunctioned software
Malicious software
Malfunctioning of security
PCT stands for _____
Private Communication Technique
Private Connecting Technology
Private Communication Technology
Personal Communication Technology
State whether True or False: Data encryption is primarily used to ensure confidentiality.
True
False
Cannot be interpreted
None
The most common way to maintain data availability?
Data clustering
Data Altering
Data Backup
Data Recovery
To what does a DNS translate a domain name
Hex
IP
Binary
URL
Total types of scanning in cyber security is?
1
2
3
4
What is the CIA triad also known as?
AIC(Availability, Integrity, Confidentiality)
NIC(Non-repudiation, Integrity, Confidentiality)
AIN(Availability, Integrity, Non-repudiation)
ANC(Availability, Non-repudiation, Confidentiality)
What is transformed using cipher algorithms?
Scalar text
Complex text
Plain text
None
Identify the type of attack which uses a fraudulent server with a relay address.
MITM
NTLM
SMB
NetBIOS
Which of the following is considered as the unsolicited commercial email?
Virus
Malware
Spam
All of the above
Which of the following is used for encrypting data at the network level?
HTTPS
SMTP
S/MIME
IPSec
Which of the following is used for monitoring traffic and analyzing network flow?
Managed detection and response
Cloud access security broker
Network traffic analysis
Network security firewall
Which of the following platforms is used for the safety and protection of information in the cloud?
AWS
Cloud workload protection platforms
Cloud security protocols
One Drive
Which of the following suite is used for NTP enumeration?
DNS
SNMP
NTP
HTTP
Which of the following tool is used in Wi-fi hacking?
Aircrack-ng
Wireshark
Norton
None
Which one of the following can be considered as the class of computer threats?
Dos Attack
Phishing
Soliciting
Both B and C
Which protocol is mostly used in Wi-fi security?
WPS
WPA
WPA2
Both b and c.
Which software is mainly used to help users detect viruses and avoid them?
Antivirus
Adware
Malware
None of the above
Why is Code red?
Antivirus
Virus
Word processing software
Photo editing software
Why is response and transit time used?
To measure reliability
To measure security
To measure longevity
To measure performance
Why is the proxy server used by a hacker?
For obtaining remote access connection
Hiding malicious activity on the network
Create a ghost server on the network
Create a stronger connection with the target
Identify the least strong security encryption.
WPA2
WEP
WPA3
WPA
CHAP stands for?
Challenge Hardware Authentication Protocols
Circuit Hardware Authentication Protocols
Challenge Handshake Authentication Protocols
Circuit Handshake Authentication Protocols
Choose among the following techniques, which are used to hide information inside a picture.
Image rendering
Steganography
Rootkits
Bitmapping
Choose the default port number for Apache and other web servers.
20
27
80
87
Choose the features which violate cyber security.
Exploit
Attack
Compliance
None
EDR stands for _____?
Endless detection and response
Endpoint detection and response
Endless detection and recovery
Endpoint detection and recovery
Full form of TCP/IP?
Transmission Control Protocol/ internet protocol
Transmission Control Protocol/ internet protocol
Transaction Control protocol/ internet protocol
Transmission Contribution protocol/ internet protocol
Identify among the following which is used to avoid browser-based hacking.
Adware remover in browser
Incognito mode in the browser
Anti-malware in browser
Remote browser access
Identify the class of computer threats.
Phishing
DOS attack
Soliciting
Both B and C
Identify the Debian-based OS which has 2 virtual machines and focuses on preserving users’ data.
Ubuntu
Fedora
Whonix
Kubuntu
Identify the element which is not considered in the triad, according to the CIA.
Authenticity
Availability
Integrity
Confidentiality
Identify the first computer virus among the following.
Blaster
Creeper
Sasser
Both b and c
Identify the incorrect type of scanning?
SYN Stealth
Null Scan
Xmas tree Scan
Cloud scan
Among the following, identify the one which does not need any host program and is independent.
Worm
Virus
Trojan horse
Trap door
Identify the legal form of hacking.
Cracking
Non-ethical hacking
Ethical hacking
Hacktivism
Identify the mail transferring methodology which isn’t secured.
SSMTP
S/MIME
POP3
Mail using PGP
Identify the malware which does not replicate or clone through an infection?
Trojans
Worms
Rootkits
Virus
Identify the maximum character which Linux OS supports in its file names.
32
64
128
256
Identify the oldest phone hacking technique used by hackers to make free calls.
Spamming
Phreaking
Cracking
Phishing
Identify the port used to connect to Active Directory in Windows 2000.
139
445
80
389
Identify the private search engine.
Bing
Duckduckgo
Yahoo
Identify the security protocol which is not strong.
SMTP
SSL
SFTP
HTTPS
Identify the term among the following which is the first phase of ethical hacking.
Footprinting
ARP Poisoning
DNS Poisoning
Enumeration
Identify the term which denotes that only authorized users are capable of accessing the information
Confidentiality
Availability
Integrity
Non-repudiation
Identify the term which denotes the protection of data from modification by unknown users.
Confidentiality
Authentication
Integrity
Non-repudiation
Identify the term which denotes the violation of principle if the computer is no more accessible.
Access control
Availability
Confidentiality
All of the above