Explore topic-wise MCQs in Cyber Security.

This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.

A. Data-hack
B. Data-stealing
C. Database altering
D. Data breach
Answer» E.
2.

Site-to-Site VPN architecture is also known as _________

A. Remote connection based VPNs
B. Peer-to-Peer VPNs
C. Extranet based VPN
D. Country-to-country VPNs
Answer» D. Country-to-country VPNs
3.

Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability.

A. Windows 7
B. Chrome
C. IOS12
D. UNIX
Answer» E.
4.

________ automates an action or attack so that repetitive tasks are done at a faster rate.

A. Auto-bots
B. Cookie-bots
C. Robots
D. Bots
Answer» E.
5.

______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.

A. Scareware
B. Ransomware
C. Adware
D. Spyware
Answer» E.
6.

TACACS+ uses TCP port 49.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
7.

How many types of exploits are there based on their nature from hacking’s perspective?

A. 4
B. 3
C. 2
D. 5
Answer» D. 5
8.

Known exploits have a confirmation of and measures can be taken against it to resolve them.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
9.

______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system.

A. Memory leakage
B. Buffer-overrun
C. Less processing power
D. Inefficient programming
Answer» C. Less processing power
10.

RBAC is abbreviated as ______________

A. Rule-Based Accessing Control
B. Role-Based Access Control
C. Rule-Based Access Control
D. Role-Based Accessing Control
Answer» C. Rule-Based Access Control
11.

To stop your system from getting enumerated, you have to disable all services.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
12.

Packet filtering firewalls are vulnerable to __________

A. hardware vulnerabilities
B. MiTM
C. phishing
D. spoofing
Answer» E.
13.

___________ will give you an USB which will contain ___________ that will take control of your system in the background.

A. Attackers, Trojans
B. White hat hackers, antivirus
C. White hat hackers, Trojans
D. Attackers, antivirus
Answer» B. White hat hackers, antivirus
14.

Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
15.

Stateful Multilayer Inspection firewall cannot perform which of the following?

A. Filter network layer packets
B. Check for legitimate session
C. Scans for illicit data packets at the presentation layer
D. Evaluate packets at application lager
Answer» D. Evaluate packets at application lager
16.

Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
17.

___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.

A. algorithm-licensing
B. code-licensing
C. item licensing
D. product licensing
Answer» E.
18.

ATM Skimmers are used to take your confidential data from your ATM cards.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
19.

_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.

A. Cyber-replication
B. Mimicking
C. Website-Duplication
D. Pharming
Answer» B. Mimicking
20.

There are ________ types of VPN protocols.

A. 3
B. 4
C. 5
D. 6
Answer» E.
21.

Which of the following is the port number for SMTP service?

A. 29
B. 27
C. 25
D. 23
Answer» D. 23
22.

________ needs some control for data flow on each and every logical port.

A. Antivirus
B. Network firewall
C. Intrusion Detection Systems (IDS)
D. Anti-malware
Answer» C. Intrusion Detection Systems (IDS)
23.

The __________ defines the packet filtering firewall rules.

A. Access Control List
B. Protocols
C. Policies
D. Ports
Answer» B. Protocols
24.

________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.

A. Spyware
B. Ransomware
C. Adware
D. Shareware
Answer» C. Adware
25.

In an application that uses stack, the memory for data is allocated ____________

A. logical
B. dynamically
C. statically
D. at the end of the program
Answer» D. at the end of the program
26.

The logical port is associated with the type of protocol used along with the IP address of the host.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
27.

Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.

A. C, Ruby
B. Python, Ruby
C. C, C++
D. Tcl, C#
Answer» D. Tcl, C#
28.

A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.

A. scratch
B. patch
C. fixer
D. resolver
Answer» C. fixer
29.

Testing for buffer-overflow in a system can be done manually and has two possible ways.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
30.

Which of the following is the port number for Kerberos?

A. 87
B. 88
C. 89
D. 86
Answer» C. 89
31.

The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________

A. Distributed Denial-of-Service (DDoS)
B. Permanent Denial-of-Service (PDoS)
C. Denial-of-Service (DoS)
D. Controlled Denial-of-Service (CDoS)
Answer» B. Permanent Denial-of-Service (PDoS)
32.

______________ is the first phase of ethical hacking.

A. DNS poisoning
B. Footprinting
C. ARP-poisoning
D. Enumeration
Answer» C. ARP-poisoning
33.

__________ suite is used for NTP enumeration.

A. DNS
B. NTP
C. HTTP
D. SNMP
Answer» C. HTTP
34.

Which of the following is the port number for POP3?

A. 110
B. 111
C. 112
D. 113
Answer» B. 111
35.

_________ are a specific section of any virus or malware that performs illicit activities in a system.

A. Malicious programs
B. Worms
C. Spyware
D. Payload
Answer» E.
36.

A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers.

A. hardware enumerator
B. software enumerator
C. network enumerator
D. cloud enumerator
Answer» D. cloud enumerator
37.

enum4linux is used to enumerate _______________

A. Linux systems
B. Windows systems
C. Chrome systems
D. Mac systems
Answer» B. Windows systems
38.

RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
39.

Enumeration does not depend on which of the following services?

A. DNS enumeration
B. SNMP enumeration
C. NTP enumeration
D. HTTPS enumeration
Answer» E.
40.

The antivirus or PC defender software in a system helps in detecting virus and Trojans.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
41.

_________ are also used for hides user’s physical location.

A. Firewall
B. Antivirus
C. Incognito mode
D. VPN
Answer» E.
42.

In a Linux-based system, the accounts may be members of 1 or more than one group.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
43.

A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.

A. MiTM
B. Browser hacking
C. Browser Hijacker
D. Cookie-stealing
Answer» D. Cookie-stealing
44.

What common web scripting languages are used by attackers to fetch various details from its surfing users?

A. Tcl and C#
B. C++ and HTML
C. HTML and Python
D. Perl and JavaScript
Answer» E.
45.

Network enumeration is the finding of __________ or devices on a network.

A. hosts
B. servers
C. network connection
D. cloud storage
Answer» B. servers
46.

______________ is a common tool used for doing OS fingerprinting.

A. Hping
B. Wireshark
C. Nmap
D. Nessus
Answer» D. Nessus
47.

Network administrators can create their own ACL rules based on _______ ________ and _______

A. Address, Protocols and Packet attributes
B. Address, Protocols and security policies
C. Address, policies and Packet attributes
D. Network topology, Protocols and data packets
Answer» B. Address, Protocols and security policies
48.

Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure.

A. array
B. queue
C. stack
D. heap
Answer» E.
49.

ACL stands for _____________

A. Access Condition List
B. Anti-Control List
C. Access Control Logs
D. Access Control List
Answer» E.
50.

Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

A. Remote access VPNs
B. Site-to-site VPNs
C. Peer-to-Peer VPNs
D. Country-to-country VPNs
Answer» C. Peer-to-Peer VPNs