

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. |
A. | System error |
B. | Bugged system |
C. | Security bug |
D. | System virus |
Answer» D. System virus | |
2. |
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. |
A. | Exploiting |
B. | Cracking |
C. | Hacking |
D. | Pivoting |
Answer» E. | |
3. |
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. |
A. | Local exploits |
B. | Remote exploits |
C. | System exploits |
D. | Network exploits |
Answer» B. Remote exploits | |
4. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. |
A. | True |
B. | False |
Answer» B. False | |
5. |
_____________ is a special type of vulnerability that doesn’t possess risk. |
A. | Vulnerabilities without risk |
B. | Vulnerabilities without attacker |
C. | Vulnerabilities without action |
D. | Vulnerabilities no one knows |
Answer» B. Vulnerabilities without attacker | |
6. |
_________TYPE_OF_EXPLOIT_REQUIRES_ACCESSING_TO_ANY_VULNERABLE_SYSTEM_FOR_ENHANCING_PRIVILEGE_FOR_AN_ATTACKER_TO_RUN_THE_EXPLOIT.?$ |
A. | Local exploits |
B. | Remote exploits |
C. | System exploits |
D. | Network exploits |
Answer» B. Remote exploits | |
7. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.$ |
A. | System error |
B. | Bugged system |
C. | Security bug |
D. | System virus |
Answer» D. System virus | |
8. |
____________is_a_technique_used_by_penetration_testers_to_compromise_any_system_within_a_network_for_targeting_other_systems.$ |
A. | Exploiting |
B. | Cracking |
C. | Hacking |
D. | Pivoting |
Answer» E. | |
9. |
A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software. |
A. | True |
B. | False |
Answer» B. False | |
10. |
ISMS is abbreviated as __________ |
A. | Information Server Management System |
B. | Information Security Management Software |
C. | Internet Server Management System |
D. | Information Security Management System |
Answer» E. | |
11. |
__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed. |
A. | Time-frame of vulnerability |
B. | Window of vulnerability |
C. | Time-lap of vulnerability |
D. | Entry-door of vulnerability |
Answer» C. Time-lap of vulnerability | |
12. |
Security bugs are also known as _______ |
A. | security defect |
B. | security problems |
C. | system defect |
D. | software error |
Answer» B. security problems | |
13. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability? |
A. | True |
B. | False |
Answer» B. False | |
14. |
There are ________ types of exploit. |
A. | 3 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
15. |
A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors. |
A. | malware |
B. | trojan |
C. | worms |
D. | exploit |
Answer» E. | |
16. |
_____________ is a special type of vulnerability that doesn’t possess risk.$ |
A. | Vulnerabilities without risk |
B. | Vulnerabilities without attacker |
C. | Vulnerabilities without action |
D. | Vulnerabilities no one knows |
Answer» B. Vulnerabilities without attacker | |
17. |
Risk and vulnerabilities are the same things. |
A. | True |
B. | False |
Answer» C. | |
18. |
____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system. |
A. | Bug protection |
B. | Bug bounty |
C. | Vulnerability measurement |
D. | Vulnerability management |
Answer» E. | |
19. |
_________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. |
A. | Attack vector |
B. | Attack surface |
C. | Attack point |
D. | Attack arena |
Answer» C. Attack point | |
20. |
___________ is a weakness that can be exploited by attackers. |
A. | System with Virus |
B. | System without firewall |
C. | System with vulnerabilities |
D. | System with strong password |
Answer» D. System with strong password | |