18th
Mar
Cyber Security MCQ

Cyber Security MCQ

  • Admin
  • 18th Mar, 2023
  • 314 Followers

Cyber Security is a process of protecting or defending computers, networks, mobile devices, electronic data, and servers from viruses and malicious attacks. Its main function is to reduce cyber-attacks as well as protect from illegal exploitation. Cybercrimes are increasing day by day, so it becomes especially important to strengthen Cyber Security to protect sensitive data.

Finally, Practice Cyber Security MCQ Questions to test your knowledge and understanding of a variety of cybersecurity topics. get ready to ace your cyber security exam.

Cyber Security MCQ Questions

1) Which of the following tool is used for Wi-Fi hacking?

  • A. Nessus
  • B.Snort
  • C.Wireshark
  • D.Aircrack-ng

2) Which of the following is a popular IP address and port scanner?

  • A. Snort
  • B.Ettercap
  • C.Cain and Abel
  • D.Angry IP Scanner

3) Which of the following is not an example of physical data leakage?

  • A. Phishing
  • B.Dumpster diving
  • C.Shoulder surfing
  • D.Printers and photocopiers

4) What is the unauthorized movement of data?

  • A. Data cracking
  • B.Data infiltration
  • C.Data exfiltration
  • D.Database hacking

5) Which of the following is not an information source over the internet for target attackers?

  • A. YouTube
  • B.Whois
  • C.Nslookup
  • D.Archive sites
Download Free : Cyber Security MCQ PDF

6) There are ........... types of scanning in ethical hacking and cyber-security

  • A. 2
  • B.3
  • C.4
  • D.6

7) ............. is not a valid scanning method.

  • A. Null Scan
  • B.Cloud scan
  • C.SYN Stealth scan
  • D.Xmas Tree scan

8) Which of the following is the most important activity in system hacking?

  • A. Covering tracks
  • B.Escalating privileges
  • C.Cracking passwords
  • D.Information gathering

9) Which of the followings are the types of scanning?

  • A. Passive, active, and interactive
  • B.Port, network, and services
  • C.Server, client, and network
  • D.Network, vulnerability, and port

10) Which of the following database is queried by Whois?

  • A. ARIN
  • B.APNIC
  • C.DNS
  • D.ICANN

11) Which of the following is the first computer virus?

  • A. Creeper
  • B.Blaster
  • C.Sasser
  • D.None of the above

12) We should turn on .............. to protect Our Computer from hacker.

  • A. VLC
  • B.Script
  • C.Antivirus
  • D.Firewall

13) What is Code red?

  • A. Antivirus
  • B.Virus
  • C.Photo Editing Software
  • D.None of the above

14) Which of the following is also known as Malicious software?

  • A. Badware
  • B.illegalware
  • C.Malware
  • D.Maliciousware

15) What are the elements of cybersecurity?

  • A. Network security
  • B.Operational security
  • C.Application security
  • D.All of the above

16) What are the common cyber-attacks which can be used by hackers to damage network?

  • A. Phishing & Password attacks
  • B.Malware & Malvertising
  • C.DDoS & Drive-by downloads
  • D.All of the above

17) A computer virus may be used to -

  • A. Corrupt data in your computer
  • B.Log the user's keystrokes
  • C.Access private data like user id and passwords
  • D.All of the above

18) Which of the following option is used to protect data and passwords?

  • A. Authorization
  • B.Authentication
  • C.Encryption
  • D.Non-repudiation

19) What does TCP/ IP stands for?

  • A. Transaction control protocol / Internal protocol
  • B.Transmission control protocol / Internet protocol
  • C.Transmission contribution protocol / Internal protocol
  • D.None of the above

20) Which of the following wireless protocol uses TKIP?

  • A. WPA
  • B.WEP
  • C.WPA2
  • D.WPS

21) Which of the following can be considered as the elements of cyber security?

  • A. Network Security
  • B.Operational Security
  • C.Application Security
  • D.All of the above

22) In system hacking, which of the following is the most crucial activity?

  • A. Covering tracks
  • B.Cracking passwords
  • C.Information gathering
  • D.None of the above

23) which one of the following usually used in the process of wi-fi-hacking?

  • A. Norton
  • B.Wireshark
  • C.Aircrack-ng
  • D.None of the above

24) Which database is queried by whois?

  • A. DNS
  • B.ARIN
  • C.APNIC
  • D.ICANN

25) which of the following is most important in design of secure system?

  • A. Assessing vulnerability
  • B.Changing or Updating System according to vulnerability
  • C.Both A & B
  • D.None of the above

26) Which of the following is not an example of malware?

  • A. virus
  • B.worm
  • C.Browser
  • D.Trojan horse

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

01st
Feb
Linux MCQ
01st
Feb
Oracle MCQ
01st
Feb
PL/SQL MCQ
01st
Jun
JSP MCQ
01st
Feb
Terraform MCQ