Information Security MCQ Quiz

  1. In The SSL Record Protocol Operation Pad_2 Is -
  2. The DSS Signature Uses Which Hash Algorithm?
  3. The Certificate_request Massage Includes Two Parameters, One Of Which Is-
  4. In The Handshake Protocol Which Is The Message Type First Sent Between Client And Server ?
  5. Which Of The Following Malicious Program Do Not Replicate Automatically?
  6. Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?
  7. Why Would A Hacker Use A Proxy Server?
  8. Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?
  9. To Hide Information Inside A Picture, What Technology Is Used?
  10. What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide Information?
  11. What Is The Sequence Of A TCP Connection?
  12. What Tool Can Be Used To Perform SNMP Enumeration?
  13. The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?
  14. What Port Does Telnet Use?

Take Information Security Quiz To test your Knowledge 

Below are few Information Security MCQ test that checks your basic knowledge of Information Security. This Information Security Test contains around 20 questions of multiple choice with 4 options. You have to select the right answer to a question. You can see the correct answer by clicking view answer link.

Also, Read Best Cyber Security interview questions.

Information Security MCQ

1. In The SSL Record Protocol Operation Pad_2 Is -

  • Is The Byte 0x36 Repeated 40 Times For MD5
  • Is The Byte 0x5C Repeated 48 Times For MD5
  • Is The Byte 0x5C Repeated 48 Times For SHA-1
  • Is The Byte 0x36 Repeated 48 Times For MD5
View Answer

2. The DSS Signature Uses Which Hash Algorithm?

  • MD5
  • SHA-2
  • SHA-1
  • Does Not Use Hash Algorithm

3. The Certificate_request Massage Includes Two Parameters, One Of Which Is-

  • Certificate_extension
  • Certificate_creation
  • Certificate_exchange
  • Certificate_type
View Answer

4. In The Handshake Protocol Which Is The Message Type First Sent Between Client And Server ?

  • Server_hello
  • Client_hello
  • Hello_request
  • Certificate_request
View Answer

5. Which Of The Following Malicious Program Do Not Replicate Automatically?

  • Trojan Horse
  • Virus
  • Worm
  • Zombie
View Answer

6. Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?

  • Trap Doors
  • Trojan Horse
  • Virus
  • Worm

7. Why Would A Hacker Use A Proxy Server?

  • To Create A Stronger Connection With The Target.
  • To Create A Ghost Server On The Network.
  • To Hide Malicious Activity On The Network
  • To Obtain A Remote Access Connection.
View Answer

8. Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?

  • The System Configuration
  • The Business Strategy Of The Company
  • The Education Of The Attacker
  • The Network Architecture
View Answer

9. To Hide Information Inside A Picture, What Technology Is Used?

  • Rootkits
  • Bitmapping
  • Steganography
  • Image Rendering
View Answer

10. What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide Information?

  • Library Level Rootkits
  • Kernel Level Rootkits
  • System Level Rootkits
  • Application Level Rootkits
View Answer

11. What Is The Sequence Of A TCP Connection?

  • SYN-ACK-FIN
  • SYN-SYN ACK-ACK
  • SYN-ACK
  • SYN-SYN-ACK
View Answer

12. What Tool Can Be Used To Perform SNMP Enumeration?

  • DNSlookup
  • Whois
  • Nslookup
  • IP Network Browser
View Answer

13. The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?

  • Availability
  • Confidentiality
  • Integrity
  • Authentication
View Answer

14. What Port Does Telnet Use?

  • 22
  • 80
  • 20
  • 23

15. Performing Hacking Activities With The Intent On Gaining Visibility For An Unfair Situation Is Called

  • Cracking
  • Analysis
  • Hacktivism
  • Exploitation
View Answer

16. What Is The Most Important Activity In System Hacking?

  • Information Gathering
  • Cracking Passwords
  • Escalating Privileges
  • Covering Tracks
View Answer

17. Phishing Is A Form Of

  • Impersonation
  • Spamming
  • Identify Theft
  • Scanning
View Answer

18. Enumeration Is Part Of What Phase Of Ethical Hacking?

  • Reconnaissance
  • Maintaining Access
  • Gaining Access
  • Scanning
View Answer

19. Keyloggers Are A Form Of

  • Spyware
  • Shoulder Surfing
  • Trojan
  • Social Engineering
View Answer

20. When A Person Is Harrassed Repeatedly By Being Followed, Called Or Be Written To He/she Is A Target Of

  • Bullying
  • Identity Theft
  • Phishing
  • Stalking
View Answer

21. Which Of The Following Is A Class Of Computer Threat

  • DoS Attacks
  • Phishing
  • Stalking
  • Soliciting
View Answer