

MCQOPTIONS
Saved Bookmarks
This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information. |
A. | Data-hack |
B. | Data-stealing |
C. | Database altering |
D. | Data breach |
Answer» E. | |
2. |
Site-to-Site VPN architecture is also known as _________ |
A. | Remote connection based VPNs |
B. | Peer-to-Peer VPNs |
C. | Extranet based VPN |
D. | Country-to-country VPNs |
Answer» D. Country-to-country VPNs | |
3. |
Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. |
A. | Windows 7 |
B. | Chrome |
C. | IOS12 |
D. | UNIX |
Answer» E. | |
4. |
________ automates an action or attack so that repetitive tasks are done at a faster rate. |
A. | Auto-bots |
B. | Cookie-bots |
C. | Robots |
D. | Bots |
Answer» E. | |
5. |
______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems. |
A. | Scareware |
B. | Ransomware |
C. | Adware |
D. | Spyware |
Answer» E. | |
6. |
TACACS+ uses TCP port 49. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
7. |
How many types of exploits are there based on their nature from hacking’s perspective? |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» D. 5 | |
8. |
Known exploits have a confirmation of and measures can be taken against it to resolve them. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
9. |
______________ is a widespread app’s coding mistake made by developers which could be exploited by an attacker for gaining access or malfunctioning your system. |
A. | Memory leakage |
B. | Buffer-overrun |
C. | Less processing power |
D. | Inefficient programming |
Answer» C. Less processing power | |
10. |
RBAC is abbreviated as ______________ |
A. | Rule-Based Accessing Control |
B. | Role-Based Access Control |
C. | Rule-Based Access Control |
D. | Role-Based Accessing Control |
Answer» C. Rule-Based Access Control | |
11. |
To stop your system from getting enumerated, you have to disable all services. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
12. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | MiTM |
C. | phishing |
D. | spoofing |
Answer» E. | |
13. |
___________ will give you an USB which will contain ___________ that will take control of your system in the background. |
A. | Attackers, Trojans |
B. | White hat hackers, antivirus |
C. | White hat hackers, Trojans |
D. | Attackers, antivirus |
Answer» B. White hat hackers, antivirus | |
14. |
Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
15. |
Stateful Multilayer Inspection firewall cannot perform which of the following? |
A. | Filter network layer packets |
B. | Check for legitimate session |
C. | Scans for illicit data packets at the presentation layer |
D. | Evaluate packets at application lager |
Answer» D. Evaluate packets at application lager | |
16. |
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
17. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. |
A. | algorithm-licensing |
B. | code-licensing |
C. | item licensing |
D. | product licensing |
Answer» E. | |
18. |
ATM Skimmers are used to take your confidential data from your ATM cards. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
19. |
_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic. |
A. | Cyber-replication |
B. | Mimicking |
C. | Website-Duplication |
D. | Pharming |
Answer» B. Mimicking | |
20. |
There are ________ types of VPN protocols. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» E. | |
21. |
Which of the following is the port number for SMTP service? |
A. | 29 |
B. | 27 |
C. | 25 |
D. | 23 |
Answer» D. 23 | |
22. |
________ needs some control for data flow on each and every logical port. |
A. | Antivirus |
B. | Network firewall |
C. | Intrusion Detection Systems (IDS) |
D. | Anti-malware |
Answer» C. Intrusion Detection Systems (IDS) | |
23. |
The __________ defines the packet filtering firewall rules. |
A. | Access Control List |
B. | Protocols |
C. | Policies |
D. | Ports |
Answer» B. Protocols | |
24. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. |
A. | Spyware |
B. | Ransomware |
C. | Adware |
D. | Shareware |
Answer» C. Adware | |
25. |
In an application that uses stack, the memory for data is allocated ____________ |
A. | logical |
B. | dynamically |
C. | statically |
D. | at the end of the program |
Answer» D. at the end of the program | |
26. |
The logical port is associated with the type of protocol used along with the IP address of the host. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
27. |
Applications developed by programming languages like ____ and ______ have this common buffer-overflow error. |
A. | C, Ruby |
B. | Python, Ruby |
C. | C, C++ |
D. | Tcl, C# |
Answer» D. Tcl, C# | |
28. |
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it. |
A. | scratch |
B. | patch |
C. | fixer |
D. | resolver |
Answer» C. fixer | |
29. |
Testing for buffer-overflow in a system can be done manually and has two possible ways. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
30. |
Which of the following is the port number for Kerberos? |
A. | 87 |
B. | 88 |
C. | 89 |
D. | 86 |
Answer» C. 89 | |
31. |
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________ |
A. | Distributed Denial-of-Service (DDoS) |
B. | Permanent Denial-of-Service (PDoS) |
C. | Denial-of-Service (DoS) |
D. | Controlled Denial-of-Service (CDoS) |
Answer» B. Permanent Denial-of-Service (PDoS) | |
32. |
______________ is the first phase of ethical hacking. |
A. | DNS poisoning |
B. | Footprinting |
C. | ARP-poisoning |
D. | Enumeration |
Answer» C. ARP-poisoning | |
33. |
__________ suite is used for NTP enumeration. |
A. | DNS |
B. | NTP |
C. | HTTP |
D. | SNMP |
Answer» C. HTTP | |
34. |
Which of the following is the port number for POP3? |
A. | 110 |
B. | 111 |
C. | 112 |
D. | 113 |
Answer» B. 111 | |
35. |
_________ are a specific section of any virus or malware that performs illicit activities in a system. |
A. | Malicious programs |
B. | Worms |
C. | Spyware |
D. | Payload |
Answer» E. | |
36. |
A _______________ is a computer program implemented for recovering usernames & info on groups, shares as well as services of networked computers. |
A. | hardware enumerator |
B. | software enumerator |
C. | network enumerator |
D. | cloud enumerator |
Answer» D. cloud enumerator | |
37. |
enum4linux is used to enumerate _______________ |
A. | Linux systems |
B. | Windows systems |
C. | Chrome systems |
D. | Mac systems |
Answer» B. Windows systems | |
38. |
RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
39. |
Enumeration does not depend on which of the following services? |
A. | DNS enumeration |
B. | SNMP enumeration |
C. | NTP enumeration |
D. | HTTPS enumeration |
Answer» E. | |
40. |
The antivirus or PC defender software in a system helps in detecting virus and Trojans. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
41. |
_________ are also used for hides user’s physical location. |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
42. |
In a Linux-based system, the accounts may be members of 1 or more than one group. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
43. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. |
A. | MiTM |
B. | Browser hacking |
C. | Browser Hijacker |
D. | Cookie-stealing |
Answer» D. Cookie-stealing | |
44. |
What common web scripting languages are used by attackers to fetch various details from its surfing users? |
A. | Tcl and C# |
B. | C++ and HTML |
C. | HTML and Python |
D. | Perl and JavaScript |
Answer» E. | |
45. |
Network enumeration is the finding of __________ or devices on a network. |
A. | hosts |
B. | servers |
C. | network connection |
D. | cloud storage |
Answer» B. servers | |
46. |
______________ is a common tool used for doing OS fingerprinting. |
A. | Hping |
B. | Wireshark |
C. | Nmap |
D. | Nessus |
Answer» D. Nessus | |
47. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | Address, Protocols and Packet attributes |
B. | Address, Protocols and security policies |
C. | Address, policies and Packet attributes |
D. | Network topology, Protocols and data packets |
Answer» B. Address, Protocols and security policies | |
48. |
Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of _______ data-structure. |
A. | array |
B. | queue |
C. | stack |
D. | heap |
Answer» E. | |
49. |
ACL stands for _____________ |
A. | Access Condition List |
B. | Anti-Control List |
C. | Access Control Logs |
D. | Access Control List |
Answer» E. | |
50. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
A. | Remote access VPNs |
B. | Site-to-site VPNs |
C. | Peer-to-Peer VPNs |
D. | Country-to-country VPNs |
Answer» C. Peer-to-Peer VPNs | |