

MCQOPTIONS
Saved Bookmarks
This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
51. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
A. | Visual Private Network |
B. | Virtual Protocol Network |
C. | Virtual Protocol Networking |
D. | Virtual Private Network |
Answer» E. | |
52. |
What types of data are stolen by cyber-criminals in most of the cases? |
A. | Data that will pay once sold |
B. | Data that has no value |
C. | Data like username and passwords only |
D. | Data that is old |
Answer» B. Data that has no value | |
53. |
To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
54. |
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
55. |
Adware are pre-chosen _______ developed to display ads. |
A. | banner |
B. | software |
C. | malware |
D. | shareware |
Answer» C. malware | |
56. |
MAC is abbreviated as _______________ |
A. | Machine Access Control |
B. | Mandatory Accounts Control |
C. | Mandatory Access Controlling |
D. | Mandatory Access Control |
Answer» E. | |
57. |
Which of these is not a step followed by cyber-criminals in data breaching? |
A. | Research and info-gathering |
B. | Attack the system |
C. | Fixing the bugs |
D. | Exfiltration |
Answer» D. Exfiltration | |
58. |
An attacker, who is an employee of your firm may ___________ to know your system password. |
A. | do peeping |
B. | perform network jamming |
C. | do shoulder surfing |
D. | steal your laptop |
Answer» D. steal your laptop | |
59. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. |
A. | hacking |
B. | database |
C. | server |
D. | security |
Answer» E. | |
60. |
Which of the following is the port number for SNMP? |
A. | 160 |
B. | 161 |
C. | 162 |
D. | 163 |
Answer» C. 162 | |
61. |
Which of the following is the port number for FTP control? |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» C. 22 | |
62. |
Why apps developed in languages like C, C++ is prone to Buffer-overflow? |
A. | No string boundary checks in predefined functions |
B. | No storage check in the external memory |
C. | No processing power check |
D. | No database check |
Answer» B. No storage check in the external memory | |
63. |
______ is the term used for toolkits that are purchased and used for targeting different exploits. |
A. | Exploit bag |
B. | Exploit set |
C. | Exploit Toolkit |
D. | Exploit pack |
Answer» E. | |
64. |
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system. |
A. | that vendor’s site |
B. | security solution site |
C. | malicious site |
D. | software downloading site |
Answer» D. software downloading site | |
65. |
Backdoors are also known as ____________ |
A. | Trap doors |
B. | Front doors |
C. | Cover doors |
D. | Back entry |
Answer» B. Front doors | |
66. |
A ______ can hide a user’s browsing activity. |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
67. |
Enumeration is done to gain information. Which of the following cannot be achieved using enumeration? |
A. | IP Tables |
B. | SNMP data, if not secured appropriately |
C. | Private chats |
D. | List of username and password policies |
Answer» D. List of username and password policies | |
68. |
_________ is one of the most secured Linux OS that provides anonymity and an incognito option for securing its user data. |
A. | Fedora |
B. | Tails |
C. | Ubuntu |
D. | OpenSUSE |
Answer» C. Ubuntu | |
69. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen. |
A. | information |
B. | papers |
C. | hardcopy files |
D. | media files |
Answer» B. papers | |
70. |
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later? |
A. | Scanning |
B. | Maintaining access |
C. | Maintaining Access |
D. | Gaining access |
Answer» D. Gaining access | |
71. |
_______ is the tool used for this purpose. |
A. | Powersploit |
B. | Aircrack – ng |
C. | Snort |
D. | Nmap |
Answer» B. Aircrack – ng | |
72. |
Which of the following comes after scanning phase in ethical hacking? |
A. | Scanning |
B. | Maintaining access |
C. | Reconnaissance |
D. | Gaining access |
Answer» E. | |
73. |
In _______ phase, the hackers try to hide their footprints. |
A. | Scanning |
B. | Tracks clearing |
C. | Reconnaissance |
D. | Gaining access |
Answer» C. Reconnaissance | |
74. |
_________ type of VPNs are used for home private and secure connectivity. |
A. | Remote access VPNs |
B. | Site-to-site VPNs |
C. | Peer-to-Peer VPNs |
D. | Router-to-router VPNs |
Answer» B. Site-to-site VPNs | |
75. |
Which of the companies and organizations do not become the major targets of attackers for data stealing? |
A. | Business firms |
B. | Medical and Healthcare |
C. | Government and secret agencies |
D. | NGOs |
Answer» E. | |
76. |
________________ important and precious file is a solution to prevent your files from ransomware. |
A. | Deleting all |
B. | Keeping backup of |
C. | Not saving |
D. | Keeping in pen drive |
Answer» C. Not saving | |
77. |
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________ |
A. | Dumpster diving |
B. | Shoulder surfing |
C. | Phishing |
D. | Spamming |
Answer» B. Shoulder surfing | |
78. |
DTE is abbreviated as ___________________ |
A. | Domain and Type Enforcing |
B. | Domain and Type Enforcement |
C. | DNS and Type Enforcement |
D. | DNS and Type Enforcing |
Answer» C. DNS and Type Enforcement | |
79. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
A. | resend |
B. | dropped |
C. | destroyed |
D. | acknowledged as received |
Answer» C. destroyed | |
80. |
Which of the following is the port number for SNMP – Trap? |
A. | 160 |
B. | 161 |
C. | 162 |
D. | 163 |
Answer» D. 163 | |
81. |
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system. |
A. | Scareware |
B. | Ransomware |
C. | Adware |
D. | Spyware |
Answer» C. Adware | |
82. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
A. | Hardware Firewall |
B. | Software Firewall |
C. | Stateful Inspection Firewall |
D. | Microsoft Firewall |
Answer» C. Stateful Inspection Firewall | |
83. |
Network enumerator is also known as ________________ |
A. | hardware scanner |
B. | software enumerator |
C. | program enumerator |
D. | network scanner |
Answer» E. | |
84. |
Packet filtering firewalls are deployed on ________ |
A. | routers |
B. | switches |
C. | hubs |
D. | repeaters |
Answer» B. switches | |
85. |
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts. |
A. | ping-based hacking |
B. | ping sweep |
C. | ping-range |
D. | pinging |
Answer» C. ping-range | |
86. |
__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained. |
A. | Hardware enumeration |
B. | System enumeration |
C. | Network enumeration |
D. | Cloud enumeration |
Answer» D. Cloud enumeration | |
87. |
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system? |
A. | Rootkits |
B. | Backdoors |
C. | Trojans |
D. | Wireshark |
Answer» E. | |
88. |
___________ is used that tries for guessing the usernames by using SMTP service. |
A. | smtp-user-enum |
B. | smtp-enum |
C. | snmp-enum |
D. | snmp-user-enum |
Answer» B. smtp-enum | |
89. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
A. | IPSec, SSL |
B. | L2TP, SSL |
C. | IPSec, SSH |
D. | SSH, SSL |
Answer» B. L2TP, SSL | |
90. |
Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
91. |
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
92. |
Finding & publishing any user’s identity with the help of different personal details is called ________ |
A. | Doxing |
B. | Data breaching |
C. | Personal data copying |
D. | Secure File Transferring Protocol |
Answer» B. Data breaching | |
93. |
___________ firewalls are a combination of other three types of firewalls. |
A. | Packet Filtering |
B. | Circuit Level Gateway |
C. | Application-level Gateway |
D. | Stateful Multilayer Inspection |
Answer» E. | |
94. |
Which of the following is an example of passive reconnaissance? |
A. | Telephonic calls to target victim |
B. | Attacker as a fake person for Help Desk support |
C. | Talk to the target user in person |
D. | Search about target records in online people database |
Answer» E. | |
95. |
Which of them is not a scanning tool? |
A. | NMAP |
B. | Nexpose |
C. | Maltego |
D. | Nessus |
Answer» D. Nessus | |
96. |
Which of them does not comes under scanning methodologies? |
A. | Vulnerability scanning |
B. | Sweeping |
C. | Port Scanning |
D. | Google Dorks |
Answer» E. | |
97. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
98. |
Which of the following is not considering the adequate measure for physical security? |
A. | Lock the drawers |
B. | Keep strong passwords for corporate laptops and mobile phones |
C. | Keep confidential organization’s document file open in the desk |
D. | Hide your hand against camera while inserting the PIN code |
Answer» D. Hide your hand against camera while inserting the PIN code | |
99. |
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. |
A. | network security |
B. | physical security |
C. | database security |
D. | wireless security |
Answer» C. database security | |
100. |
Which of the following is not a physical security measure to protect against physical hacking? |
A. | Add front desk & restrict unknown access to the back room |
B. | Create a phishing policy |
C. | Analyze how employees maintain their physical data and data storage peripheral devices |
D. | Updating the patches in the software you’re working at your office laptop. |
Answer» E. | |