MCQOPTIONS
Saved Bookmarks
This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information. |
| A. | Data-hack |
| B. | Data-stealing |
| C. | Database altering |
| D. | Data breach |
| Answer» E. | |
| 2. |
Site-to-Site VPN architecture is also known as _________ |
| A. | Remote connection based VPNs |
| B. | Peer-to-Peer VPNs |
| C. | Extranet based VPN |
| D. | Country-to-country VPNs |
| Answer» D. Country-to-country VPNs | |
| 3. |
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. |
| A. | Windows 7 |
| B. | Chrome |
| C. | IOS12 |
| D. | UNIX |
| Answer» E. | |
| 4. |
________ automates an action or attack so that repetitive tasks are done at a faster rate. |
| A. | Auto-bots |
| B. | Cookie-bots |
| C. | Robots |
| D. | Bots |
| Answer» E. | |
| 5. |
______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems. |
| A. | Scareware |
| B. | Ransomware |
| C. | Adware |
| D. | Spyware |
| Answer» E. | |
| 6. |
TACACS+ uses TCP port 49. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 7. |
How many types of exploits are there based on their nature from hacking’s perspective? |
| A. | 4 |
| B. | 3 |
| C. | 2 |
| D. | 5 |
| Answer» D. 5 | |
| 8. |
Known exploits have a confirmation of and measures can be taken against it to resolve them. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 9. |
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system. |
| A. | Memory leakage |
| B. | Buffer-overrun |
| C. | Less processing power |
| D. | Inefficient programming |
| Answer» C. Less processing power | |
| 10. |
RBAC is abbreviated as ______________ |
| A. | Rule-Based Accessing Control |
| B. | Role-Based Access Control |
| C. | Rule-Based Access Control |
| D. | Role-Based Accessing Control |
| Answer» C. Rule-Based Access Control | |
| 11. |
To stop your system from getting enumerated, you have to disable all services. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 12. |
Packet filtering firewalls are vulnerable to __________ |
| A. | hardware vulnerabilities |
| B. | MiTM |
| C. | phishing |
| D. | spoofing |
| Answer» E. | |
| 13. |
___________ will give you an USB which will contain ___________ that will take control of your system in the background. |
| A. | Attackers, Trojans |
| B. | White hat hackers, antivirus |
| C. | White hat hackers, Trojans |
| D. | Attackers, antivirus |
| Answer» B. White hat hackers, antivirus | |
| 14. |
Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 15. |
Stateful Multilayer Inspection firewall cannot perform which of the following? |
| A. | Filter network layer packets |
| B. | Check for legitimate session |
| C. | Scans for illicit data packets at the presentation layer |
| D. | Evaluate packets at application lager |
| Answer» D. Evaluate packets at application lager | |
| 16. |
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 17. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. |
| A. | algorithm-licensing |
| B. | code-licensing |
| C. | item licensing |
| D. | product licensing |
| Answer» E. | |
| 18. |
ATM Skimmers are used to take your confidential data from your ATM cards. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 19. |
_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic. |
| A. | Cyber-replication |
| B. | Mimicking |
| C. | Website-Duplication |
| D. | Pharming |
| Answer» B. Mimicking | |
| 20. |
There are ________ types of VPN protocols. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 21. |
Which of the following is the port number for SMTP service? |
| A. | 29 |
| B. | 27 |
| C. | 25 |
| D. | 23 |
| Answer» D. 23 | |
| 22. |
________ needs some control for data flow on each and every logical port. |
| A. | Antivirus |
| B. | Network firewall |
| C. | Intrusion Detection Systems (IDS) |
| D. | Anti-malware |
| Answer» C. Intrusion Detection Systems (IDS) | |
| 23. |
The __________ defines the packet filtering firewall rules. |
| A. | Access Control List |
| B. | Protocols |
| C. | Policies |
| D. | Ports |
| Answer» B. Protocols | |
| 24. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. |
| A. | Spyware |
| B. | Ransomware |
| C. | Adware |
| D. | Shareware |
| Answer» C. Adware | |
| 25. |
In an application that uses stack, the memory for data is allocated ____________ |
| A. | logical |
| B. | dynamically |
| C. | statically |
| D. | at the end of the program |
| Answer» D. at the end of the program | |
| 26. |
The logical port is associated with the type of protocol used along with the IP address of the host. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 27. |
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. |
| A. | C, Ruby |
| B. | Python, Ruby |
| C. | C, C++ |
| D. | Tcl, C# |
| Answer» D. Tcl, C# | |
| 28. |
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it. |
| A. | scratch |
| B. | patch |
| C. | fixer |
| D. | resolver |
| Answer» C. fixer | |
| 29. |
Testing for buffer-overflow in a system can be done manually and has two possible ways. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 30. |
Which of the following is the port number for Kerberos? |
| A. | 87 |
| B. | 88 |
| C. | 89 |
| D. | 86 |
| Answer» C. 89 | |
| 31. |
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________ |
| A. | Distributed Denial-of-Service (DDoS) |
| B. | Permanent Denial-of-Service (PDoS) |
| C. | Denial-of-Service (DoS) |
| D. | Controlled Denial-of-Service (CDoS) |
| Answer» B. Permanent Denial-of-Service (PDoS) | |
| 32. |
______________ is the first phase of ethical hacking. |
| A. | DNS poisoning |
| B. | Footprinting |
| C. | ARP-poisoning |
| D. | Enumeration |
| Answer» C. ARP-poisoning | |
| 33. |
__________ suite is used for NTP enumeration. |
| A. | DNS |
| B. | NTP |
| C. | HTTP |
| D. | SNMP |
| Answer» C. HTTP | |
| 34. |
Which of the following is the port number for POP3? |
| A. | 110 |
| B. | 111 |
| C. | 112 |
| D. | 113 |
| Answer» B. 111 | |
| 35. |
_________ are a specific section of any virus or malware that performs illicit activities in a system. |
| A. | Malicious programs |
| B. | Worms |
| C. | Spyware |
| D. | Payload |
| Answer» E. | |
| 36. |
A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers. |
| A. | hardware enumerator |
| B. | software enumerator |
| C. | network enumerator |
| D. | cloud enumerator |
| Answer» D. cloud enumerator | |
| 37. |
enum4linux is used to enumerate _______________ |
| A. | Linux systems |
| B. | Windows systems |
| C. | Chrome systems |
| D. | Mac systems |
| Answer» B. Windows systems | |
| 38. |
RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 39. |
Enumeration does not depend on which of the following services? |
| A. | DNS enumeration |
| B. | SNMP enumeration |
| C. | NTP enumeration |
| D. | HTTPS enumeration |
| Answer» E. | |
| 40. |
The antivirus or PC defender software in a system helps in detecting virus and Trojans. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 41. |
_________ are also used for hides user’s physical location. |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 42. |
In a Linux-based system, the accounts may be members of 1 or more than one group. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 43. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. |
| A. | MiTM |
| B. | Browser hacking |
| C. | Browser Hijacker |
| D. | Cookie-stealing |
| Answer» D. Cookie-stealing | |
| 44. |
What common web scripting languages are used by attackers to fetch various details from its surfing users? |
| A. | Tcl and C# |
| B. | C++ and HTML |
| C. | HTML and Python |
| D. | Perl and JavaScript |
| Answer» E. | |
| 45. |
Network enumeration is the finding of __________ or devices on a network. |
| A. | hosts |
| B. | servers |
| C. | network connection |
| D. | cloud storage |
| Answer» B. servers | |
| 46. |
______________ is a common tool used for doing OS fingerprinting. |
| A. | Hping |
| B. | Wireshark |
| C. | Nmap |
| D. | Nessus |
| Answer» D. Nessus | |
| 47. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
| A. | Address, Protocols and Packet attributes |
| B. | Address, Protocols and security policies |
| C. | Address, policies and Packet attributes |
| D. | Network topology, Protocols and data packets |
| Answer» B. Address, Protocols and security policies | |
| 48. |
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure. |
| A. | array |
| B. | queue |
| C. | stack |
| D. | heap |
| Answer» E. | |
| 49. |
ACL stands for _____________ |
| A. | Access Condition List |
| B. | Anti-Control List |
| C. | Access Control Logs |
| D. | Access Control List |
| Answer» E. | |
| 50. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
| A. | Remote access VPNs |
| B. | Site-to-site VPNs |
| C. | Peer-to-Peer VPNs |
| D. | Country-to-country VPNs |
| Answer» C. Peer-to-Peer VPNs | |