Explore topic-wise MCQs in Cyber Security.

This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

51.

__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A. Visual Private Network
B. Virtual Protocol Network
C. Virtual Protocol Networking
D. Virtual Private Network
Answer» E.
52.

What types of data are stolen by cyber-criminals in most of the cases?

A. Data that will pay once sold
B. Data that has no value
C. Data like username and passwords only
D. Data that is old
Answer» B. Data that has no value
53.

To secure your system from such type of attack, you have to hide your system behind any VPN or proxy server.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
54.

Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
55.

Adware are pre-chosen _______ developed to display ads.

A. banner
B. software
C. malware
D. shareware
Answer» C. malware
56.

MAC is abbreviated as _______________

A. Machine Access Control
B. Mandatory Accounts Control
C. Mandatory Access Controlling
D. Mandatory Access Control
Answer» E.
57.

Which of these is not a step followed by cyber-criminals in data breaching?

A. Research and info-gathering
B. Attack the system
C. Fixing the bugs
D. Exfiltration
Answer» D. Exfiltration
58.

An attacker, who is an employee of your firm may ___________ to know your system password.

A. do peeping
B. perform network jamming
C. do shoulder surfing
D. steal your laptop
Answer» D. steal your laptop
59.

Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.

A. hacking
B. database
C. server
D. security
Answer» E.
60.

Which of the following is the port number for SNMP?

A. 160
B. 161
C. 162
D. 163
Answer» C. 162
61.

Which of the following is the port number for FTP control?

A. 20
B. 21
C. 22
D. 23
Answer» C. 22
62.

Why apps developed in languages like C, C++ is prone to Buffer-overflow?

A. No string boundary checks in predefined functions
B. No storage check in the external memory
C. No processing power check
D. No database check
Answer» B. No storage check in the external memory
63.

______ is the term used for toolkits that are purchased and used for targeting different exploits.

A. Exploit bag
B. Exploit set
C. Exploit Toolkit
D. Exploit pack
Answer» E.
64.

Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.

A. that vendor’s site
B. security solution site
C. malicious site
D. software downloading site
Answer» D. software downloading site
65.

Backdoors are also known as ____________

A. Trap doors
B. Front doors
C. Cover doors
D. Back entry
Answer» B. Front doors
66.

A ______ can hide a user’s browsing activity.

A. Firewall
B. Antivirus
C. Incognito mode
D. VPN
Answer» E.
67.

Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?

A. IP Tables
B. SNMP data, if not secured appropriately
C. Private chats
D. List of username and password policies
Answer» D. List of username and password policies
68.

_________ is one of the most secured Linux OS that provides anonymity and an incognito option for securing its user data.

A. Fedora
B. Tails
C. Ubuntu
D. OpenSUSE
Answer» C. Ubuntu
69.

Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.

A. information
B. papers
C. hardcopy files
D. media files
Answer» B. papers
70.

In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?

A. Scanning
B. Maintaining access
C. Maintaining Access
D. Gaining access
Answer» D. Gaining access
71.

_______ is the tool used for this purpose.

A. Powersploit
B. Aircrack – ng
C. Snort
D. Nmap
Answer» B. Aircrack – ng
72.

Which of the following comes after scanning phase in ethical hacking?

A. Scanning
B. Maintaining access
C. Reconnaissance
D. Gaining access
Answer» E.
73.

In _______ phase, the hackers try to hide their footprints.

A. Scanning
B. Tracks clearing
C. Reconnaissance
D. Gaining access
Answer» C. Reconnaissance
74.

_________ type of VPNs are used for home private and secure connectivity.

A. Remote access VPNs
B. Site-to-site VPNs
C. Peer-to-Peer VPNs
D. Router-to-router VPNs
Answer» B. Site-to-site VPNs
75.

Which of the companies and organizations do not become the major targets of attackers for data stealing?

A. Business firms
B. Medical and Healthcare
C. Government and secret agencies
D. NGOs
Answer» E.
76.

________________ important and precious file is a solution to prevent your files from ransomware.

A. Deleting all
B. Keeping backup of
C. Not saving
D. Keeping in pen drive
Answer» C. Not saving
77.

You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________

A. Dumpster diving
B. Shoulder surfing
C. Phishing
D. Spamming
Answer» B. Shoulder surfing
78.

DTE is abbreviated as ___________________

A. Domain and Type Enforcing
B. Domain and Type Enforcement
C. DNS and Type Enforcement
D. DNS and Type Enforcing
Answer» C. DNS and Type Enforcement
79.

When a packet does not fulfil the ACL criteria, the packet is _________

A. resend
B. dropped
C. destroyed
D. acknowledged as received
Answer» C. destroyed
80.

Which of the following is the port number for SNMP – Trap?

A. 160
B. 161
C. 162
D. 163
Answer» D. 163
81.

_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.

A. Scareware
B. Ransomware
C. Adware
D. Spyware
Answer» C. Adware
82.

_________ is software that is installed using an internet connection or they come by-default with operating systems.

A. Hardware Firewall
B. Software Firewall
C. Stateful Inspection Firewall
D. Microsoft Firewall
Answer» C. Stateful Inspection Firewall
83.

Network enumerator is also known as ________________

A. hardware scanner
B. software enumerator
C. program enumerator
D. network scanner
Answer» E.
84.

Packet filtering firewalls are deployed on ________

A. routers
B. switches
C. hubs
D. repeaters
Answer» B. switches
85.

A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.

A. ping-based hacking
B. ping sweep
C. ping-range
D. pinging
Answer» C. ping-range
86.

__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.

A. Hardware enumeration
B. System enumeration
C. Network enumeration
D. Cloud enumeration
Answer» D. Cloud enumeration
87.

Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?

A. Rootkits
B. Backdoors
C. Trojans
D. Wireshark
Answer» E.
88.

___________ is used that tries for guessing the usernames by using SMTP service.

A. smtp-user-enum
B. smtp-enum
C. snmp-enum
D. snmp-user-enum
Answer» B. smtp-enum
89.

For secure connection, Remote access VPNs rely on ___________ and ____________

A. IPSec, SSL
B. L2TP, SSL
C. IPSec, SSH
D. SSH, SSL
Answer» B. L2TP, SSL
90.

Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
91.

Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
92.

Finding & publishing any user’s identity with the help of different personal details is called ________

A. Doxing
B. Data breaching
C. Personal data copying
D. Secure File Transferring Protocol
Answer» B. Data breaching
93.

___________ firewalls are a combination of other three types of firewalls.

A. Packet Filtering
B. Circuit Level Gateway
C. Application-level Gateway
D. Stateful Multilayer Inspection
Answer» E.
94.

Which of the following is an example of passive reconnaissance?

A. Telephonic calls to target victim
B. Attacker as a fake person for Help Desk support
C. Talk to the target user in person
D. Search about target records in online people database
Answer» E.
95.

Which of them is not a scanning tool?

A. NMAP
B. Nexpose
C. Maltego
D. Nessus
Answer» D. Nessus
96.

Which of them does not comes under scanning methodologies?

A. Vulnerability scanning
B. Sweeping
C. Port Scanning
D. Google Dorks
Answer» E.
97.

If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
98.

Which of the following is not considering the adequate measure for physical security?

A. Lock the drawers
B. Keep strong passwords for corporate laptops and mobile phones
C. Keep confidential organization’s document file open in the desk
D. Hide your hand against camera while inserting the PIN code
Answer» D. Hide your hand against camera while inserting the PIN code
99.

Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.

A. network security
B. physical security
C. database security
D. wireless security
Answer» C. database security
100.

Which of the following is not a physical security measure to protect against physical hacking?

A. Add front desk & restrict unknown access to the back room
B. Create a phishing policy
C. Analyze how employees maintain their physical data and data storage peripheral devices
D. Updating the patches in the software you’re working at your office laptop.
Answer» E.