 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. | 
| A. | System error | 
| B. | Bugged system | 
| C. | Security bug | 
| D. | System virus | 
| Answer» D. System virus | |
| 2. | ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. | 
| A. | Exploiting | 
| B. | Cracking | 
| C. | Hacking | 
| D. | Pivoting | 
| Answer» E. | |
| 3. | ________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. | 
| A. | Local exploits | 
| B. | Remote exploits | 
| C. | System exploits | 
| D. | Network exploits | 
| Answer» B. Remote exploits | |
| 4. | Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 5. | _____________ is a special type of vulnerability that doesn’t possess risk. | 
| A. | Vulnerabilities without risk | 
| B. | Vulnerabilities without attacker | 
| C. | Vulnerabilities without action | 
| D. | Vulnerabilities no one knows | 
| Answer» B. Vulnerabilities without attacker | |
| 6. | _________TYPE_OF_EXPLOIT_REQUIRES_ACCESSING_TO_ANY_VULNERABLE_SYSTEM_FOR_ENHANCING_PRIVILEGE_FOR_AN_ATTACKER_TO_RUN_THE_EXPLOIT.?$ | 
| A. | Local exploits | 
| B. | Remote exploits | 
| C. | System exploits | 
| D. | Network exploits | 
| Answer» B. Remote exploits | |
| 7. | A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.$ | 
| A. | System error | 
| B. | Bugged system | 
| C. | Security bug | 
| D. | System virus | 
| Answer» D. System virus | |
| 8. | ____________is_a_technique_used_by_penetration_testers_to_compromise_any_system_within_a_network_for_targeting_other_systems.$ | 
| A. | Exploiting | 
| B. | Cracking | 
| C. | Hacking | 
| D. | Pivoting | 
| Answer» E. | |
| 9. | A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 10. | ISMS is abbreviated as __________ | 
| A. | Information Server Management System | 
| B. | Information Security Management Software | 
| C. | Internet Server Management System | 
| D. | Information Security Management System | 
| Answer» E. | |
| 11. | __________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed. | 
| A. | Time-frame of vulnerability | 
| B. | Window of vulnerability | 
| C. | Time-lap of vulnerability | 
| D. | Entry-door of vulnerability | 
| Answer» C. Time-lap of vulnerability | |
| 12. | Security bugs are also known as _______ | 
| A. | security defect | 
| B. | security problems | 
| C. | system defect | 
| D. | software error | 
| Answer» B. security problems | |
| 13. | Remote exploits is that type of exploits acts over any network to exploit on security vulnerability? | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 14. | There are ________ types of exploit. | 
| A. | 3 | 
| B. | 2 | 
| C. | 5 | 
| D. | 4 | 
| Answer» C. 5 | |
| 15. | A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors. | 
| A. | malware | 
| B. | trojan | 
| C. | worms | 
| D. | exploit | 
| Answer» E. | |
| 16. | _____________ is a special type of vulnerability that doesn’t possess risk.$ | 
| A. | Vulnerabilities without risk | 
| B. | Vulnerabilities without attacker | 
| C. | Vulnerabilities without action | 
| D. | Vulnerabilities no one knows | 
| Answer» B. Vulnerabilities without attacker | |
| 17. | Risk and vulnerabilities are the same things. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 18. | ____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system. | 
| A. | Bug protection | 
| B. | Bug bounty | 
| C. | Vulnerability measurement | 
| D. | Vulnerability management | 
| Answer» E. | |
| 19. | _________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. | 
| A. | Attack vector | 
| B. | Attack surface | 
| C. | Attack point | 
| D. | Attack arena | 
| Answer» C. Attack point | |
| 20. | ___________ is a weakness that can be exploited by attackers. | 
| A. | System with Virus | 
| B. | System without firewall | 
| C. | System with vulnerabilities | 
| D. | System with strong password | 
| Answer» D. System with strong password | |