Explore topic-wise MCQs in Cyber Security.

This section includes 147 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

101.

Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
102.

___________ is a special form of attack using which hackers’ exploit – human psychology.

A. Cross Site Scripting
B. Insecure network
C. Social Engineering
D. Reverse Engineering
Answer» D. Reverse Engineering
103.

Known bugs can be solved or removed by __________________ develop by the vendors of the application.

A. removing the application
B. changing the software
C. installing security patches
D. installing database patches
Answer» D. installing database patches
104.

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

A. security officer
B. malicious hacker
C. security auditor
D. network analyst
Answer» C. security auditor
105.

__________ is the last phase of ethical hacking process.

A. Scanning
B. Tracks clearing
C. Reconnaissance
D. Reporting
Answer» E.
106.

Which of the following is not a footprint-scanning tool?

A. SuperScan
B. TcpView
C. Maltego
D. OWASP Zed
Answer» D. OWASP Zed
107.

_______________ in a system is given so that users can use dedicated parts of the system for which they’ve been given access to.

A. Machine Access Control
B. Mandatory Accounts Control
C. Mandatory Access Control
D. Mandatory Access Controlling
Answer» D. Mandatory Access Controlling
108.

Which of them is not a track clearing technique?

A. Altering log files
B. Tunnelling
C. Port Scanning
D. Footprint removing
Answer» D. Footprint removing
109.

While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
Answer» C. Gaining access
110.

IKE is abbreviated as Internet Key Exchange.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
111.

Authentication in PCT requires _____ keys.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
112.

S/MIME is abbreviated as __________________

A. Secure/Multimedia Internet Mailing Extensions
B. Secure/Multipurpose Internet Mailing Extensions
C. Secure/Multimedia Internet Mail Extensions
D. Secure/Multipurpose Internet Mail Extensions
Answer» E.
113.

Users are able to see a pad-lock icon in the address bar of the browser when there is _______ connection.

A. HTTP
B. HTTPS
C. SMTP
D. SFTP
Answer» C. SMTP
114.

__________ is used for encrypting data at network level.

A. IPSec
B. HTTPS
C. SMTP
D. S/MIME
Answer» B. HTTPS
115.

____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in preserving users’ data private.

A. Fedora
B. Ubuntu
C. Whonix
D. Kubuntu
Answer» D. Kubuntu
116.

In the ______________ layer of OSI model, packet filtering firewalls are implemented.

A. Application layer
B. Session layer
C. Presentation layer
D. Network layer
Answer» E.
117.

Which of the following do not comes under security measures for cloud in firms?

A. Firewall
B. Antivirus
C. Load Balancer
D. Encryption
Answer» C. Load Balancer
118.

________ is the ability of an individual to gain physical access to an authorized area.

A. Network accessing
B. Database accessing
C. Remote accessing
D. Physical accessing
Answer» E.
119.

Which of the following is the port number for SFTP service?

A. 21
B. 22
C. 23
D. 69
Answer» C. 23
120.

Which of the following is the port number for FTP data?

A. 20
B. 21
C. 22
D. 23
Answer» B. 21
121.

One advantage of Stateful Multilayer Inspection firewall is __________

A. costlier but easy to understand
B. large to manage
C. complex internal architecture
D. large to manage but efficient
Answer» D. large to manage but efficient
122.

An attacker may use automatic brute forcing tool to compromise your ____________

A. username
B. employee ID
C. system / PC name
D. password
Answer» E.
123.

Which of the following is the port number for SSH (Secure Shell)?

A. 20
B. 21
C. 22
D. 23
Answer» D. 23
124.

We can also implement ____________ in Stateful Multilayer Inspection firewall.

A. external programs
B. algorithms
C. policies
D. algorithms and external programs
Answer» C. policies
125.

________ is an attack technique occurs when excess data gets written to a memory block.

A. Over buffering
B. Buffering
C. Buffer overflow
D. Memory full
Answer» D. Memory full
126.

Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ___________ from within the email.

A. ‘forward’ option
B. ‘show original’ option
C. ‘Show full email’
D. ‘View Original’ option
Answer» C. ‘Show full email’
127.

Attackers commonly target ____________ for fetching IP address of a target or victim user.

A. websites
B. web pages
C. ip tracker
D. emails
Answer» B. web pages
128.

Information Gathering about the system or the person or about organization or network is not important.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
129.

Let suppose a search box of an application can take at most 200 words, and you’ve inserted more than that and pressed the search button; the system crashes. Usually this is because of limited __________

A. buffer
B. external storage
C. processing power
D. local storage
Answer» B. external storage
130.

This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?

A. Confidentiality
B. Non-repudiation
C. CIA Triad
D. Authenticity
Answer» D. Authenticity
131.

Which method of hacking will record all your keystrokes?

A. Keyhijacking
B. Keyjacking
C. Keylogging
D. Keyboard monitoring
Answer» D. Keyboard monitoring
132.

When you use the word _____ it means you are protecting your data from getting disclosed.

A. Confidentiality
B. Integrity
C. Authentication
D. Availability
Answer» B. Integrity
133.

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

A. Malware
B. Remote Access Trojans
C. Keyloggers
D. Spyware
Answer» E.
134.

_________ are the special type of programs used for recording and tracking user’s keystroke.

A. Keylogger
B. Trojans
C. Virus
D. Worms
Answer» B. Trojans
135.

Lack of access control policy is a _____________

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» D. Attack
136.

Possible threat to any information cannot be ________________

A. reduced
B. transferred
C. protected
D. ignored
Answer» E.
137.

Compromising confidential information comes under _________

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» C. Vulnerability
138.

This helps in identifying the origin of information and authentic user. This referred to here as __________

A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
Answer» D. Availability
139.

Data integrity gets compromised when _____ and _____ are taken control off.

A. Access control, file deletion
B. Network, file permission
C. Access control, file permission
D. Network, system
Answer» D. Network, system
140.

Data ___________ is used to ensure confidentiality.

A. Encryption
B. Locking
C. Deleting
D. Backup
Answer» B. Locking
141.

Which of these is not a proper method of maintaining confidentiality?

A. Biometric verification
B. ID and password based verification
C. 2-factor authentication
D. switching off the phone
Answer» E.
142.

_______ of information means, only authorised users are capable of accessing the information.

A. Confidentiality
B. Integrity
C. Non-repudiation
D. Availability
Answer» E.
143.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A. They help understanding hacking better
B. They are key elements to a security breach
C. They help understands security and its components better
D. They help to understand the cyber-crime better
Answer» D. They help to understand the cyber-crime better
144.

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A. Cyber-crime
B. Cyber Attack
C. System hijacking
D. Digital crime
Answer» C. System hijacking
145.

Which of them is not a wireless attack?

A. Eavesdropping
B. MAC Spoofing
C. Wireless Hijacking
D. Phishing
Answer» E.
146.

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

A. Session Hijacking
B. Session Fixation
C. Cookie stuffing
D. Session Spying
Answer» B. Session Fixation
147.

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

A. SQL injection
B. HTML Injection
C. Cross Site Scripting (XSS)
D. Cross Site Request Forgery (XSRF)
Answer» D. Cross Site Request Forgery (XSRF)