MCQOPTIONS
Saved Bookmarks
This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
| A. | Visual Private Network |
| B. | Virtual Protocol Network |
| C. | Virtual Protocol Networking |
| D. | Virtual Private Network |
| Answer» E. | |
| 52. |
What types of data are stolen by cyber-criminals in most of the cases? |
| A. | Data that will pay once sold |
| B. | Data that has no value |
| C. | Data like username and passwords only |
| D. | Data that is old |
| Answer» B. Data that has no value | |
| 53. |
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 54. |
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 55. |
Adware are pre-chosen _______ developed to display ads. |
| A. | banner |
| B. | software |
| C. | malware |
| D. | shareware |
| Answer» C. malware | |
| 56. |
MAC is abbreviated as _______________ |
| A. | Machine Access Control |
| B. | Mandatory Accounts Control |
| C. | Mandatory Access Controlling |
| D. | Mandatory Access Control |
| Answer» E. | |
| 57. |
Which of these is not a step followed by cyber-criminals in data breaching? |
| A. | Research and info-gathering |
| B. | Attack the system |
| C. | Fixing the bugs |
| D. | Exfiltration |
| Answer» D. Exfiltration | |
| 58. |
An attacker, who is an employee of your firm may ___________ to know your system password. |
| A. | do peeping |
| B. | perform network jamming |
| C. | do shoulder surfing |
| D. | steal your laptop |
| Answer» D. steal your laptop | |
| 59. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. |
| A. | hacking |
| B. | database |
| C. | server |
| D. | security |
| Answer» E. | |
| 60. |
Which of the following is the port number for SNMP? |
| A. | 160 |
| B. | 161 |
| C. | 162 |
| D. | 163 |
| Answer» C. 162 | |
| 61. |
Which of the following is the port number for FTP control? |
| A. | 20 |
| B. | 21 |
| C. | 22 |
| D. | 23 |
| Answer» C. 22 | |
| 62. |
Why apps developed in languages like C, C++ is prone to Buffer-overflow? |
| A. | No string boundary checks in predefined functions |
| B. | No storage check in the external memory |
| C. | No processing power check |
| D. | No database check |
| Answer» B. No storage check in the external memory | |
| 63. |
______ is the term used for toolkits that are purchased and used for targeting different exploits. |
| A. | Exploit bag |
| B. | Exploit set |
| C. | Exploit Toolkit |
| D. | Exploit pack |
| Answer» E. | |
| 64. |
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system. |
| A. | that vendor’s site |
| B. | security solution site |
| C. | malicious site |
| D. | software downloading site |
| Answer» D. software downloading site | |
| 65. |
Backdoors are also known as ____________ |
| A. | Trap doors |
| B. | Front doors |
| C. | Cover doors |
| D. | Back entry |
| Answer» B. Front doors | |
| 66. |
A ______ can hide a user’s browsing activity. |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 67. |
Enumeration is done to gain information. Which of the following cannot be achieved using enumeration? |
| A. | IP Tables |
| B. | SNMP data, if not secured appropriately |
| C. | Private chats |
| D. | List of username and password policies |
| Answer» D. List of username and password policies | |
| 68. |
_________ is one of the most secured Linux OS that provides anonymity and an incognito option for securing its user data. |
| A. | Fedora |
| B. | Tails |
| C. | Ubuntu |
| D. | OpenSUSE |
| Answer» C. Ubuntu | |
| 69. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen. |
| A. | information |
| B. | papers |
| C. | hardcopy files |
| D. | media files |
| Answer» B. papers | |
| 70. |
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later? |
| A. | Scanning |
| B. | Maintaining access |
| C. | Maintaining Access |
| D. | Gaining access |
| Answer» D. Gaining access | |
| 71. |
_______ is the tool used for this purpose. |
| A. | Powersploit |
| B. | Aircrack – ng |
| C. | Snort |
| D. | Nmap |
| Answer» B. Aircrack – ng | |
| 72. |
Which of the following comes after scanning phase in ethical hacking? |
| A. | Scanning |
| B. | Maintaining access |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» E. | |
| 73. |
In _______ phase, the hackers try to hide their footprints. |
| A. | Scanning |
| B. | Tracks clearing |
| C. | Reconnaissance |
| D. | Gaining access |
| Answer» C. Reconnaissance | |
| 74. |
_________ type of VPNs are used for home private and secure connectivity. |
| A. | Remote access VPNs |
| B. | Site-to-site VPNs |
| C. | Peer-to-Peer VPNs |
| D. | Router-to-router VPNs |
| Answer» B. Site-to-site VPNs | |
| 75. |
Which of the companies and organizations do not become the major targets of attackers for data stealing? |
| A. | Business firms |
| B. | Medical and Healthcare |
| C. | Government and secret agencies |
| D. | NGOs |
| Answer» E. | |
| 76. |
________________ important and precious file is a solution to prevent your files from ransomware. |
| A. | Deleting all |
| B. | Keeping backup of |
| C. | Not saving |
| D. | Keeping in pen drive |
| Answer» C. Not saving | |
| 77. |
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________ |
| A. | Dumpster diving |
| B. | Shoulder surfing |
| C. | Phishing |
| D. | Spamming |
| Answer» B. Shoulder surfing | |
| 78. |
DTE is abbreviated as ___________________ |
| A. | Domain and Type Enforcing |
| B. | Domain and Type Enforcement |
| C. | DNS and Type Enforcement |
| D. | DNS and Type Enforcing |
| Answer» C. DNS and Type Enforcement | |
| 79. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
| A. | resend |
| B. | dropped |
| C. | destroyed |
| D. | acknowledged as received |
| Answer» C. destroyed | |
| 80. |
Which of the following is the port number for SNMP – Trap? |
| A. | 160 |
| B. | 161 |
| C. | 162 |
| D. | 163 |
| Answer» D. 163 | |
| 81. |
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system. |
| A. | Scareware |
| B. | Ransomware |
| C. | Adware |
| D. | Spyware |
| Answer» C. Adware | |
| 82. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
| A. | Hardware Firewall |
| B. | Software Firewall |
| C. | Stateful Inspection Firewall |
| D. | Microsoft Firewall |
| Answer» C. Stateful Inspection Firewall | |
| 83. |
Network enumerator is also known as ________________ |
| A. | hardware scanner |
| B. | software enumerator |
| C. | program enumerator |
| D. | network scanner |
| Answer» E. | |
| 84. |
Packet filtering firewalls are deployed on ________ |
| A. | routers |
| B. | switches |
| C. | hubs |
| D. | repeaters |
| Answer» B. switches | |
| 85. |
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts. |
| A. | ping-based hacking |
| B. | ping sweep |
| C. | ping-range |
| D. | pinging |
| Answer» C. ping-range | |
| 86. |
__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained. |
| A. | Hardware enumeration |
| B. | System enumeration |
| C. | Network enumeration |
| D. | Cloud enumeration |
| Answer» D. Cloud enumeration | |
| 87. |
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system? |
| A. | Rootkits |
| B. | Backdoors |
| C. | Trojans |
| D. | Wireshark |
| Answer» E. | |
| 88. |
___________ is used that tries for guessing the usernames by using SMTP service. |
| A. | smtp-user-enum |
| B. | smtp-enum |
| C. | snmp-enum |
| D. | snmp-user-enum |
| Answer» B. smtp-enum | |
| 89. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
| A. | IPSec, SSL |
| B. | L2TP, SSL |
| C. | IPSec, SSH |
| D. | SSH, SSL |
| Answer» B. L2TP, SSL | |
| 90. |
Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 91. |
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 92. |
Finding & publishing any user’s identity with the help of different personal details is called ________ |
| A. | Doxing |
| B. | Data breaching |
| C. | Personal data copying |
| D. | Secure File Transferring Protocol |
| Answer» B. Data breaching | |
| 93. |
___________ firewalls are a combination of other three types of firewalls. |
| A. | Packet Filtering |
| B. | Circuit Level Gateway |
| C. | Application-level Gateway |
| D. | Stateful Multilayer Inspection |
| Answer» E. | |
| 94. |
Which of the following is an example of passive reconnaissance? |
| A. | Telephonic calls to target victim |
| B. | Attacker as a fake person for Help Desk support |
| C. | Talk to the target user in person |
| D. | Search about target records in online people database |
| Answer» E. | |
| 95. |
Which of them is not a scanning tool? |
| A. | NMAP |
| B. | Nexpose |
| C. | Maltego |
| D. | Nessus |
| Answer» D. Nessus | |
| 96. |
Which of them does not comes under scanning methodologies? |
| A. | Vulnerability scanning |
| B. | Sweeping |
| C. | Port Scanning |
| D. | Google Dorks |
| Answer» E. | |
| 97. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 98. |
Which of the following is not considering the adequate measure for physical security? |
| A. | Lock the drawers |
| B. | Keep strong passwords for corporate laptops and mobile phones |
| C. | Keep confidential organization’s document file open in the desk |
| D. | Hide your hand against camera while inserting the PIN code |
| Answer» D. Hide your hand against camera while inserting the PIN code | |
| 99. |
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. |
| A. | network security |
| B. | physical security |
| C. | database security |
| D. | wireless security |
| Answer» C. database security | |
| 100. |
Which of the following is not a physical security measure to protect against physical hacking? |
| A. | Add front desk & restrict unknown access to the back room |
| B. | Create a phishing policy |
| C. | Analyze how employees maintain their physical data and data storage peripheral devices |
| D. | Updating the patches in the software you’re working at your office laptop. |
| Answer» E. | |