MCQOPTIONS
Saved Bookmarks
This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 102. |
___________ is a special form of attack using which hackers’ exploit – human psychology. |
| A. | Cross Site Scripting |
| B. | Insecure network |
| C. | Social Engineering |
| D. | Reverse Engineering |
| Answer» D. Reverse Engineering | |
| 103. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application. |
| A. | removing the application |
| B. | changing the software |
| C. | installing security patches |
| D. | installing database patches |
| Answer» D. installing database patches | |
| 104. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. |
| A. | security officer |
| B. | malicious hacker |
| C. | security auditor |
| D. | network analyst |
| Answer» C. security auditor | |
| 105. |
__________ is the last phase of ethical hacking process. |
| A. | Scanning |
| B. | Tracks clearing |
| C. | Reconnaissance |
| D. | Reporting |
| Answer» E. | |
| 106. |
Which of the following is not a footprint-scanning tool? |
| A. | SuperScan |
| B. | TcpView |
| C. | Maltego |
| D. | OWASP Zed |
| Answer» D. OWASP Zed | |
| 107. |
_______________ in a system is given so that users can use dedicated parts of the system for which they’ve been given access to. |
| A. | Machine Access Control |
| B. | Mandatory Accounts Control |
| C. | Mandatory Access Control |
| D. | Mandatory Access Controlling |
| Answer» D. Mandatory Access Controlling | |
| 108. |
Which of them is not a track clearing technique? |
| A. | Altering log files |
| B. | Tunnelling |
| C. | Port Scanning |
| D. | Footprint removing |
| Answer» D. Footprint removing | |
| 109. |
While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking. |
| A. | Reconnaissance |
| B. | Scanning |
| C. | Gaining access |
| D. | Maintaining access |
| Answer» C. Gaining access | |
| 110. |
IKE is abbreviated as Internet Key Exchange. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 111. |
Authentication in PCT requires _____ keys. |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 112. |
S/MIME is abbreviated as __________________ |
| A. | Secure/Multimedia Internet Mailing Extensions |
| B. | Secure/Multipurpose Internet Mailing Extensions |
| C. | Secure/Multimedia Internet Mail Extensions |
| D. | Secure/Multipurpose Internet Mail Extensions |
| Answer» E. | |
| 113. |
Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection. |
| A. | HTTP |
| B. | HTTPS |
| C. | SMTP |
| D. | SFTP |
| Answer» C. SMTP | |
| 114. |
__________ is used for encrypting data at network level. |
| A. | IPSec |
| B. | HTTPS |
| C. | SMTP |
| D. | S/MIME |
| Answer» B. HTTPS | |
| 115. |
____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in preserving users’ data private. |
| A. | Fedora |
| B. | Ubuntu |
| C. | Whonix |
| D. | Kubuntu |
| Answer» D. Kubuntu | |
| 116. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented. |
| A. | Application layer |
| B. | Session layer |
| C. | Presentation layer |
| D. | Network layer |
| Answer» E. | |
| 117. |
Which of the following do not comes under security measures for cloud in firms? |
| A. | Firewall |
| B. | Antivirus |
| C. | Load Balancer |
| D. | Encryption |
| Answer» C. Load Balancer | |
| 118. |
________ is the ability of an individual to gain physical access to an authorized area. |
| A. | Network accessing |
| B. | Database accessing |
| C. | Remote accessing |
| D. | Physical accessing |
| Answer» E. | |
| 119. |
Which of the following is the port number for SFTP service? |
| A. | 21 |
| B. | 22 |
| C. | 23 |
| D. | 69 |
| Answer» C. 23 | |
| 120. |
Which of the following is the port number for FTP data? |
| A. | 20 |
| B. | 21 |
| C. | 22 |
| D. | 23 |
| Answer» B. 21 | |
| 121. |
One advantage of Stateful Multilayer Inspection firewall is __________ |
| A. | costlier but easy to understand |
| B. | large to manage |
| C. | complex internal architecture |
| D. | large to manage but efficient |
| Answer» D. large to manage but efficient | |
| 122. |
An attacker may use automatic brute forcing tool to compromise your ____________ |
| A. | username |
| B. | employee ID |
| C. | system / PC name |
| D. | password |
| Answer» E. | |
| 123. |
Which of the following is the port number for SSH (Secure Shell)? |
| A. | 20 |
| B. | 21 |
| C. | 22 |
| D. | 23 |
| Answer» D. 23 | |
| 124. |
We can also implement ____________ in Stateful Multilayer Inspection firewall. |
| A. | external programs |
| B. | algorithms |
| C. | policies |
| D. | algorithms and external programs |
| Answer» C. policies | |
| 125. |
________ is an attack technique occurs when excess data gets written to a memory block. |
| A. | Over buffering |
| B. | Buffering |
| C. | Buffer overflow |
| D. | Memory full |
| Answer» D. Memory full | |
| 126. |
Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email. |
| A. | ‘forward’ option |
| B. | ‘show original’ option |
| C. | ‘Show full email’ |
| D. | ‘View Original’ option |
| Answer» C. ‘Show full email’ | |
| 127. |
Attackers commonly target ____________ for fetching IP address of a target or victim user. |
| A. | websites |
| B. | web pages |
| C. | ip tracker |
| D. | emails |
| Answer» B. web pages | |
| 128. |
Information Gathering about the system or the person or about organization or network is not important. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 129. |
Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________ |
| A. | buffer |
| B. | external storage |
| C. | processing power |
| D. | local storage |
| Answer» B. external storage | |
| 130. |
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here? |
| A. | Confidentiality |
| B. | Non-repudiation |
| C. | CIA Triad |
| D. | Authenticity |
| Answer» D. Authenticity | |
| 131. |
Which method of hacking will record all your keystrokes? |
| A. | Keyhijacking |
| B. | Keyjacking |
| C. | Keylogging |
| D. | Keyboard monitoring |
| Answer» D. Keyboard monitoring | |
| 132. |
When you use the word _____ it means you are protecting your data from getting disclosed. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Availability |
| Answer» B. Integrity | |
| 133. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. |
| A. | Malware |
| B. | Remote Access Trojans |
| C. | Keyloggers |
| D. | Spyware |
| Answer» E. | |
| 134. |
_________ are the special type of programs used for recording and tracking user’s keystroke. |
| A. | Keylogger |
| B. | Trojans |
| C. | Virus |
| D. | Worms |
| Answer» B. Trojans | |
| 135. |
Lack of access control policy is a _____________ |
| A. | Bug |
| B. | Threat |
| C. | Vulnerability |
| D. | Attack |
| Answer» D. Attack | |
| 136. |
Possible threat to any information cannot be ________________ |
| A. | reduced |
| B. | transferred |
| C. | protected |
| D. | ignored |
| Answer» E. | |
| 137. |
Compromising confidential information comes under _________ |
| A. | Bug |
| B. | Threat |
| C. | Vulnerability |
| D. | Attack |
| Answer» C. Vulnerability | |
| 138. |
This helps in identifying the origin of information and authentic user. This referred to here as __________ |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authenticity |
| D. | Availability |
| Answer» D. Availability | |
| 139. |
Data integrity gets compromised when _____ and _____ are taken control off. |
| A. | Access control, file deletion |
| B. | Network, file permission |
| C. | Access control, file permission |
| D. | Network, system |
| Answer» D. Network, system | |
| 140. |
Data ___________ is used to ensure confidentiality. |
| A. | Encryption |
| B. | Locking |
| C. | Deleting |
| D. | Backup |
| Answer» B. Locking | |
| 141. |
Which of these is not a proper method of maintaining confidentiality? |
| A. | Biometric verification |
| B. | ID and password based verification |
| C. | 2-factor authentication |
| D. | switching off the phone |
| Answer» E. | |
| 142. |
_______ of information means, only authorised users are capable of accessing the information. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Non-repudiation |
| D. | Availability |
| Answer» E. | |
| 143. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? |
| A. | They help understanding hacking better |
| B. | They are key elements to a security breach |
| C. | They help understands security and its components better |
| D. | They help to understand the cyber-crime better |
| Answer» D. They help to understand the cyber-crime better | |
| 144. |
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ |
| A. | Cyber-crime |
| B. | Cyber Attack |
| C. | System hijacking |
| D. | Digital crime |
| Answer» C. System hijacking | |
| 145. |
Which of them is not a wireless attack? |
| A. | Eavesdropping |
| B. | MAC Spoofing |
| C. | Wireless Hijacking |
| D. | Phishing |
| Answer» E. | |
| 146. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ |
| A. | Session Hijacking |
| B. | Session Fixation |
| C. | Cookie stuffing |
| D. | Session Spying |
| Answer» B. Session Fixation | |
| 147. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? |
| A. | SQL injection |
| B. | HTML Injection |
| C. | Cross Site Scripting (XSS) |
| D. | Cross Site Request Forgery (XSRF) |
| Answer» D. Cross Site Request Forgery (XSRF) | |