Information Security MCQ Quiz

  1. In The SSL Record Protocol Operation Pad_2 Is -
  2. The DSS Signature Uses Which Hash Algorithm?
  3. The Certificate_request Massage Includes Two Parameters, One Of Which Is-
  4. In The Handshake Protocol Which Is The Message Type First Sent Between Client And Server ?
  5. Which Of The Following Malicious Program Do Not Replicate Automatically?
  6. Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?
  7. Why Would A Hacker Use A Proxy Server?
  8. Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?
  9. To Hide Information Inside A Picture, What Technology Is Used?
  10. What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide Information?
  11. What Is The Sequence Of A TCP Connection?
  12. What Tool Can Be Used To Perform SNMP Enumeration?
  13. The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?
  14. What Port Does Telnet Use?
Information Security MCQ

Take Information Security Quiz To test your Knowledge 

Below are few Information Security MCQ test that checks your basic knowledge of Information Security. This Information Security Test contains around 20 questions of multiple choice with 4 options. You have to select the right answer to a question. You can see the correct answer by clicking view answer link.

Also, Read Best Cyber Security interview questions.

  • Is The Byte 0x36 Repeated 40 Times For MD5
  • Is The Byte 0x5C Repeated 48 Times For MD5
  • Is The Byte 0x5C Repeated 48 Times For SHA-1
  • Is The Byte 0x36 Repeated 48 Times For MD5
View Answer
  • MD5
  • SHA-2
  • SHA-1
  • Does Not Use Hash Algorithm
  • Certificate_extension
  • Certificate_creation
  • Certificate_exchange
  • Certificate_type
View Answer
  • Server_hello
  • Client_hello
  • Hello_request
  • Certificate_request
View Answer
  • To Create A Stronger Connection With The Target.
  • To Create A Ghost Server On The Network.
  • To Hide Malicious Activity On The Network
  • To Obtain A Remote Access Connection.
View Answer
  • The System Configuration
  • The Business Strategy Of The Company
  • The Education Of The Attacker
  • The Network Architecture
View Answer
  • Rootkits
  • Bitmapping
  • Steganography
  • Image Rendering
View Answer
  • Library Level Rootkits
  • Kernel Level Rootkits
  • System Level Rootkits
  • Application Level Rootkits
View Answer
  • SYN-ACK-FIN
  • SYN-SYN ACK-ACK
  • SYN-ACK
  • SYN-SYN-ACK
View Answer
  • DNSlookup
  • Whois
  • Nslookup
  • IP Network Browser
View Answer
  • Information Gathering
  • Cracking Passwords
  • Escalating Privileges
  • Covering Tracks
View Answer
  • Impersonation
  • Spamming
  • Identify Theft
  • Scanning
View Answer
  • Reconnaissance
  • Maintaining Access
  • Gaining Access
  • Scanning
View Answer
  • Spyware
  • Shoulder Surfing
  • Trojan
  • Social Engineering
View Answer
  • DoS Attacks
  • Phishing
  • Stalking
  • Soliciting
View Answer