 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information. | 
| A. | Data-hack | 
| B. | Data-stealing | 
| C. | Database altering | 
| D. | Data breach | 
| Answer» E. | |
| 2. | Site-to-Site VPN architecture is also known as _________ | 
| A. | Remote connection based VPNs | 
| B. | Peer-to-Peer VPNs | 
| C. | Extranet based VPN | 
| D. | Country-to-country VPNs | 
| Answer» D. Country-to-country VPNs | |
| 3. | Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. | 
| A. | Windows 7 | 
| B. | Chrome | 
| C. | IOS12 | 
| D. | UNIX | 
| Answer» E. | |
| 4. | ________ automates an action or attack so that repetitive tasks are done at a faster rate. | 
| A. | Auto-bots | 
| B. | Cookie-bots | 
| C. | Robots | 
| D. | Bots | 
| Answer» E. | |
| 5. | ______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems. | 
| A. | Scareware | 
| B. | Ransomware | 
| C. | Adware | 
| D. | Spyware | 
| Answer» E. | |
| 6. | TACACS+ uses TCP port 49. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 7. | How many types of exploits are there based on their nature from hacking’s perspective? | 
| A. | 4 | 
| B. | 3 | 
| C. | 2 | 
| D. | 5 | 
| Answer» D. 5 | |
| 8. | Known exploits have a confirmation of and measures can be taken against it to resolve them. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 9. | ______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system. | 
| A. | Memory leakage | 
| B. | Buffer-overrun | 
| C. | Less processing power | 
| D. | Inefficient programming | 
| Answer» C. Less processing power | |
| 10. | RBAC is abbreviated as ______________ | 
| A. | Rule-Based Accessing Control | 
| B. | Role-Based Access Control | 
| C. | Rule-Based Access Control | 
| D. | Role-Based Accessing Control | 
| Answer» C. Rule-Based Access Control | |
| 11. | To stop your system from getting enumerated, you have to disable all services. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 12. | Packet filtering firewalls are vulnerable to __________ | 
| A. | hardware vulnerabilities | 
| B. | MiTM | 
| C. | phishing | 
| D. | spoofing | 
| Answer» E. | |
| 13. | ___________ will give you an USB which will contain ___________ that will take control of your system in the background. | 
| A. | Attackers, Trojans | 
| B. | White hat hackers, antivirus | 
| C. | White hat hackers, Trojans | 
| D. | Attackers, antivirus | 
| Answer» B. White hat hackers, antivirus | |
| 14. | Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 15. | Stateful Multilayer Inspection firewall cannot perform which of the following? | 
| A. | Filter network layer packets | 
| B. | Check for legitimate session | 
| C. | Scans for illicit data packets at the presentation layer | 
| D. | Evaluate packets at application lager | 
| Answer» D. Evaluate packets at application lager | |
| 16. | Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 17. | ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. | 
| A. | algorithm-licensing | 
| B. | code-licensing | 
| C. | item licensing | 
| D. | product licensing | 
| Answer» E. | |
| 18. | ATM Skimmers are used to take your confidential data from your ATM cards. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 19. | _________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic. | 
| A. | Cyber-replication | 
| B. | Mimicking | 
| C. | Website-Duplication | 
| D. | Pharming | 
| Answer» B. Mimicking | |
| 20. | There are ________ types of VPN protocols. | 
| A. | 3 | 
| B. | 4 | 
| C. | 5 | 
| D. | 6 | 
| Answer» E. | |
| 21. | Which of the following is the port number for SMTP service? | 
| A. | 29 | 
| B. | 27 | 
| C. | 25 | 
| D. | 23 | 
| Answer» D. 23 | |
| 22. | ________ needs some control for data flow on each and every logical port. | 
| A. | Antivirus | 
| B. | Network firewall | 
| C. | Intrusion Detection Systems (IDS) | 
| D. | Anti-malware | 
| Answer» C. Intrusion Detection Systems (IDS) | |
| 23. | The __________ defines the packet filtering firewall rules. | 
| A. | Access Control List | 
| B. | Protocols | 
| C. | Policies | 
| D. | Ports | 
| Answer» B. Protocols | |
| 24. | ________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. | 
| A. | Spyware | 
| B. | Ransomware | 
| C. | Adware | 
| D. | Shareware | 
| Answer» C. Adware | |
| 25. | In an application that uses stack, the memory for data is allocated ____________ | 
| A. | logical | 
| B. | dynamically | 
| C. | statically | 
| D. | at the end of the program | 
| Answer» D. at the end of the program | |
| 26. | The logical port is associated with the type of protocol used along with the IP address of the host. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 27. | Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. | 
| A. | C, Ruby | 
| B. | Python, Ruby | 
| C. | C, C++ | 
| D. | Tcl, C# | 
| Answer» D. Tcl, C# | |
| 28. | A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it. | 
| A. | scratch | 
| B. | patch | 
| C. | fixer | 
| D. | resolver | 
| Answer» C. fixer | |
| 29. | Testing for buffer-overflow in a system can be done manually and has two possible ways. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 30. | Which of the following is the port number for Kerberos? | 
| A. | 87 | 
| B. | 88 | 
| C. | 89 | 
| D. | 86 | 
| Answer» C. 89 | |
| 31. | The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________ | 
| A. | Distributed Denial-of-Service (DDoS) | 
| B. | Permanent Denial-of-Service (PDoS) | 
| C. | Denial-of-Service (DoS) | 
| D. | Controlled Denial-of-Service (CDoS) | 
| Answer» B. Permanent Denial-of-Service (PDoS) | |
| 32. | ______________ is the first phase of ethical hacking. | 
| A. | DNS poisoning | 
| B. | Footprinting | 
| C. | ARP-poisoning | 
| D. | Enumeration | 
| Answer» C. ARP-poisoning | |
| 33. | __________ suite is used for NTP enumeration. | 
| A. | DNS | 
| B. | NTP | 
| C. | HTTP | 
| D. | SNMP | 
| Answer» C. HTTP | |
| 34. | Which of the following is the port number for POP3? | 
| A. | 110 | 
| B. | 111 | 
| C. | 112 | 
| D. | 113 | 
| Answer» B. 111 | |
| 35. | _________ are a specific section of any virus or malware that performs illicit activities in a system. | 
| A. | Malicious programs | 
| B. | Worms | 
| C. | Spyware | 
| D. | Payload | 
| Answer» E. | |
| 36. | A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers. | 
| A. | hardware enumerator | 
| B. | software enumerator | 
| C. | network enumerator | 
| D. | cloud enumerator | 
| Answer» D. cloud enumerator | |
| 37. | enum4linux is used to enumerate _______________ | 
| A. | Linux systems | 
| B. | Windows systems | 
| C. | Chrome systems | 
| D. | Mac systems | 
| Answer» B. Windows systems | |
| 38. | RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 39. | Enumeration does not depend on which of the following services? | 
| A. | DNS enumeration | 
| B. | SNMP enumeration | 
| C. | NTP enumeration | 
| D. | HTTPS enumeration | 
| Answer» E. | |
| 40. | The antivirus or PC defender software in a system helps in detecting virus and Trojans. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 41. | _________ are also used for hides user’s physical location. | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Incognito mode | 
| D. | VPN | 
| Answer» E. | |
| 42. | In a Linux-based system, the accounts may be members of 1 or more than one group. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 43. | A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. | 
| A. | MiTM | 
| B. | Browser hacking | 
| C. | Browser Hijacker | 
| D. | Cookie-stealing | 
| Answer» D. Cookie-stealing | |
| 44. | What common web scripting languages are used by attackers to fetch various details from its surfing users? | 
| A. | Tcl and C# | 
| B. | C++ and HTML | 
| C. | HTML and Python | 
| D. | Perl and JavaScript | 
| Answer» E. | |
| 45. | Network enumeration is the finding of __________ or devices on a network. | 
| A. | hosts | 
| B. | servers | 
| C. | network connection | 
| D. | cloud storage | 
| Answer» B. servers | |
| 46. | ______________ is a common tool used for doing OS fingerprinting. | 
| A. | Hping | 
| B. | Wireshark | 
| C. | Nmap | 
| D. | Nessus | 
| Answer» D. Nessus | |
| 47. | Network administrators can create their own ACL rules based on _______ ________ and _______ | 
| A. | Address, Protocols and Packet attributes | 
| B. | Address, Protocols and security policies | 
| C. | Address, policies and Packet attributes | 
| D. | Network topology, Protocols and data packets | 
| Answer» B. Address, Protocols and security policies | |
| 48. | Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure. | 
| A. | array | 
| B. | queue | 
| C. | stack | 
| D. | heap | 
| Answer» E. | |
| 49. | ACL stands for _____________ | 
| A. | Access Condition List | 
| B. | Anti-Control List | 
| C. | Access Control Logs | 
| D. | Access Control List | 
| Answer» E. | |
| 50. | Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? | 
| A. | Remote access VPNs | 
| B. | Site-to-site VPNs | 
| C. | Peer-to-Peer VPNs | 
| D. | Country-to-country VPNs | 
| Answer» C. Peer-to-Peer VPNs | |