Explore topic-wise MCQs in Cyber Security.

This section includes 39 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.

A. EventLog Analyser
B. NordVPN
C. Wireshark
D. PacketFilter Analyzer
Answer» B. NordVPN
2.

_______________ is a popular tool used for network analysis in multiprotocol diverse network.

A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Answer» E.
3.

Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
4.

Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
5.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A. Section 66
B. Section 67
C. Section 68
D. Section 69
Answer» C. Section 68
6.

_____________ helps in protecting corporate data, communications and other assets.

A. Snort
B. CipherCloud
C. Burp Suit
D. Wireshark
Answer» C. Burp Suit
7.

________________ helps in protecting businesses against data breaches that may make threats to cloud.

A. Centrify
B. Mailbox Exchange Recovery
C. Nessus
D. Dashline
Answer» B. Mailbox Exchange Recovery
8.

Accessing computer without prior authorization is a cyber-crimes that come under _______

A. Section 65
B. Section 66
C. Section 68
D. Section 70
Answer» C. Section 68
9.

Nmap is abbreviated as Network Mapper.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
10.

Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.

A. 65
B. 65-D
C. 67
D. 70
Answer» B. 65-D
11.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A. section 67-A
B. section 67-B
C. section 67-C
D. section 67-D
Answer» B. section 67-B
12.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

A. Section 66
B. Section 67
C. Section 68
D. Section 69
Answer» C. Section 68
13.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A. 2
B. 3
C. 4
D. 5
Answer» E.
14.

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

A. 6 months of imprisonment and a fine of Rs. 50,000
B. 1 year of imprisonment and a fine of Rs. 100,000
C. 2 years of imprisonment and a fine of Rs. 250,000
D. 3 years of imprisonment and a fine of Rs. 500,000
Answer» E.
15.

________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.

A. Local exploits
B. Remote exploits
C. System exploits
D. Network exploits
Answer» B. Remote exploits
16.

______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.

A. Outlook
B. Nessus
C. Mailbox Exchange Recovery
D. Mail Exchange Recovery toolkit
Answer» D. Mail Exchange Recovery toolkit
17.

L0phtCrack is formerly known as LC3.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
18.

____________ scans TCP ports and resolves different hostnames.

A. SuperScan
B. Snort
C. Ettercap
D. QualysGuard
Answer» B. Snort
19.

___________ is a web application assessment security tool.

A. LC4
B. WebInspect
C. Ettercap
D. QualysGuard
Answer» C. Ettercap
20.

Aircrack-ng is used for ____________

A. Firewall bypassing
B. Wi-Fi attacks
C. Packet filtering
D. System password cracking
Answer» C. Packet filtering
21.

Which of the following attack-based checks WebInspect cannot do?

A. cross-site scripting
B. directory traversal
C. parameter injection
D. injecting shell code
Answer» E.
22.

___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.

A. Exploiting
B. Cracking
C. Hacking
D. Pivoting
Answer» E.
23.

_____________ is a popular IP address and port scanner.

A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Answer» D. Ettercap
24.

________ is a password recovery and auditing tool.

A. LC3
B. LC4
C. Network Stumbler
D. Maltego
Answer» C. Network Stumbler
25.

Which of this Nmap do not check?

A. services different hosts are offering
B. on what OS they are running
C. what kind of firewall is in use
D. what type of antivirus is in use
Answer» E.
26.

Which of the following deals with network intrusion detection and real-time traffic analysis?

A. John the Ripper
B. L0phtCrack
C. Snort
D. Nessus
Answer» D. Nessus
27.

Wireshark is a ____________ tool.

A. network protocol analysis
B. network connection security
C. connection analysis
D. defending malicious packet-filtering
Answer» B. network connection security
28.

____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.

A. Wireshark
B. Nessus
C. Snort
D. WebInspect
Answer» C. Snort
29.

__________ is a popular tool used for discovering networks as well as in security auditing.

A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Answer» D. Burp Suit
30.

A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.

A. System error
B. Bugged system
C. Security bug
D. System virus
Answer» D. System virus
31.

Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
32.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A. 2 years
B. 3 years
C. 4 years
D. 5 years
Answer» C. 4 years
33.

__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.

A. Cain and Abel
B. Proofpoint
C. Angry IP Scanner
D. Ettercap
Answer» C. Angry IP Scanner
34.

_________ framework made cracking of vulnerabilities easy like point and click.

A. .Net
B. Metasploit
C. Zeus
D. Ettercap
Answer» C. Zeus
35.

Which of the below-mentioned tool is used for Wi-Fi hacking?

A. Wireshark
B. Nessus
C. Aircrack-ng
D. Snort
Answer» D. Snort
36.

_____________ is a special type of vulnerability that doesn’t possess risk.

A. Vulnerabilities without risk
B. Vulnerabilities without attacker
C. Vulnerabilities without action
D. Vulnerabilities no one knows
Answer» B. Vulnerabilities without attacker
37.

In which year India’s IT Act came into existence?

A. 2000
B. 2001
C. 2002
D. 2003
Answer» B. 2001
38.

What is the full form of ITA-2000?

A. Information Tech Act -2000
B. Indian Technology Act -2000
C. International Technology Act -2000
D. Information Technology Act -2000
Answer» E.
39.

The Information Technology Act -2000 bill was passed by K. R. Narayanan.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False