Explore topic-wise MCQs in Cyber Security.

This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

_____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication.

A. Powerful Good Privacy
B. Pretty Good Privacy
C. Pretty Good Encryption
D. Pretty Strong Encryption
Answer» C. Pretty Good Encryption
2.

Which of them is not a disadvantage of active online attack?

A. Takes a long time
B. Easily and automatically detected
C. Need high network bandwidth
D. Need the patience to crack
Answer» C. Need high network bandwidth
3.

Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it?

A. Wireshark
B. Advanced Stealth Email Redirector
C. MS Outlook
D. Cisco Jabber
Answer» C. MS Outlook
4.

In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account.

A. passive online
B. active online
C. offline attack
D. non-electronic
Answer» C. offline attack
5.

PGP is abbreviated as _______________

A. Pretty Good Privacy
B. Powerful Good Privacy
C. Protocol Giving Privacy
D. Pretty Good Protocol
Answer» B. Powerful Good Privacy
6.

Hackers cannot do which of the following after compromising your phone?

A. Shoulder surfing
B. Accessing your voice mail
C. Steal your information
D. Use your app credentials
Answer» B. Accessing your voice mail
7.

Saving passwords in the browser is a good habit.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
8.

Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.

A. trojans, redirected malicious URLs
B. antivirus, patches
C. cracked software, redirected malicious URLs
D. malware, security patches
Answer» B. antivirus, patches
9.

Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.

A. Biometric
B. PIN-based
C. Alphanumeric
D. Short
Answer» B. PIN-based
10.

Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.

A. Flash Light
B. App updates
C. Bluetooth
D. Rotation
Answer» D. Rotation
11.

_________________ can be alternatively termed as password guessing attack.

A. passive online
B. active online
C. offline attack
D. non-electronic
Answer» C. offline attack
12.

Which of the following case comes under victims’ list of an active online attack?

A. Strong password based accounts
B. Unsecured HTTP users
C. Open authentication points
D. Logged in systems and services
Answer» D. Logged in systems and services