 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 27 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | ________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions. | 
| A. | Cyber-ethics | 
| B. | Social ethics | 
| C. | Cyber-bullying | 
| D. | Corporate behaviour | 
| Answer» B. Social ethics | |
| 2. | An ethical hacker must ensure that proprietary information of the firm does not get leaked. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 3. | __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. | 
| A. | Social ethics | 
| B. | Ethics in cyber-security | 
| C. | Corporate ethics | 
| D. | Ethics in black hat hacking | 
| Answer» E. | |
| 4. | After performing ____________ the ethical hacker should never disclose client information to other parties. | 
| A. | hacking | 
| B. | cracking | 
| C. | penetration testing | 
| D. | exploiting | 
| Answer» D. exploiting | |
| 5. | Performing a shoulder surfing in order to check other’s password is ____________ ethical practice. | 
| A. | a good | 
| B. | not so good | 
| C. | very good social engineering practice | 
| D. | a bad | 
| Answer» E. | |
| 6. | Role of security auditor is to ____________ | 
| A. | secure the network | 
| B. | probe for safety and security of organization’s security components and systems | 
| C. | detects and prevents cyber attacks and threats to organization | 
| D. | does penetration testing on different web applications | 
| Answer» C. detects and prevents cyber attacks and threats to organization | |
| 7. | From where the term ‘hacker’ first came to existence? | 
| A. | MIT | 
| B. | Stanford University | 
| C. | California | 
| D. | Bell’s Lab | 
| Answer» B. Stanford University | |
| 8. | What is the name of the first hacker’s conference? | 
| A. | DEFCON | 
| B. | OSCON | 
| C. | DEVCON | 
| D. | SECCON | 
| Answer» B. OSCON | |
| 9. | They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? | 
| A. | Gray Hat Hackers | 
| B. | White Hat Hackers | 
| C. | Hactivists | 
| D. | Black Hat Hackers | 
| Answer» E. | |
| 10. | A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. | 
| A. | privacy and security | 
| B. | rules and regulations | 
| C. | hacking techniques | 
| D. | ethics to talk to seniors | 
| Answer» B. rules and regulations | |
| 11. | Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ | 
| A. | Black Hat hackers | 
| B. | White Hat Hackers | 
| C. | Grey Hat Hackers | 
| D. | Red Hat Hackers | 
| Answer» C. Grey Hat Hackers | |
| 12. | The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ | 
| A. | Sponsored Hackers | 
| B. | Hactivists | 
| C. | Script Kiddies | 
| D. | Whistle Blowers | 
| Answer» D. Whistle Blowers | |
| 13. | These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to? | 
| A. | White hat Hackers | 
| B. | Elite Hackers | 
| C. | Licensed Penetration Testers | 
| D. | Red Hat Hackers | 
| Answer» C. Licensed Penetration Testers | |
| 14. | Who coined the term “cyberspace”? | 
| A. | Andrew Tannenbaum | 
| B. | Scott Fahlman | 
| C. | William Gibson | 
| D. | Richard Stallman | 
| Answer» D. Richard Stallman | |
| 15. | In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? | 
| A. | 1978 | 
| B. | 1980 | 
| C. | 1982 | 
| D. | 1984 | 
| Answer» B. 1980 | |
| 16. | AFTER_PERFORMING______________THE_ETHICAL_HACKER_SHOULD_NEVER_DISCLOSE_CLIENT_INFORMATION_TO_OTHER_PARTIES.?$ | 
| A. | hacking | 
| B. | cracking | 
| C. | penetration testing | 
| D. | exploiting | 
| Answer» D. exploiting | |
| 17. | ________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.$ | 
| A. | Cyber-ethics | 
| B. | Social ethics | 
| C. | Cyber-bullying | 
| D. | Corporate behaviour | 
| Answer» B. Social ethics | |
| 18. | ___________is_the_branch_of_cyber_security_that_deals_with_morality_and_provides_different_theories_and_a_principle_regarding_the_view-points_about_what_is_right_and_wrong.$ | 
| A. | Social ethics | 
| B. | Ethics in cyber-security | 
| C. | Corporate ethics | 
| D. | Ethics in black hat hacking | 
| Answer» E. | |
| 19. | A_penetration_tester_must_identify_and_keep_in_mind_the_____________&_____________requirements_of_a_firm_while_evaluating_the_security_postures. | 
| A. | privacy and security | 
| B. | rules and regulations | 
| C. | hacking techniques | 
| D. | ethics to talk to seniors | 
| Answer» B. rules and regulations | |
| 20. | An ethical hacker must ensure that proprietary information of the firm does not get leaked? | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 21. | Before performing any penetration test, through legal procedure, which key points listed below is not mandatory? | 
| A. | Know the nature of the organization | 
| B. | Characteristics of work done in the firm | 
| C. | System and network | 
| D. | Type of broadband company used by the firm | 
| Answer» E. | |
| 22. | The legal risks of ethical hacking include lawsuits due to __________ of personal data. | 
| A. | stealing | 
| B. | disclosure | 
| C. | deleting | 
| D. | hacking | 
| Answer» C. deleting | |
| 23. | _____________ is the technique used in business organizations and firms to protect IT assets. | 
| A. | Ethical hacking | 
| B. | Unethical hacking | 
| C. | Fixing bugs | 
| D. | Internal data-breach | 
| Answer» B. Unethical hacking | |
| 24. | Leaking your company data to the outside network without prior permission of senior authority is a crime. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 25. | ___________ has now evolved to be one of the most popular automated tools for unethical hacking. | 
| A. | Automated apps | 
| B. | Database software | 
| C. | Malware | 
| D. | Worms | 
| Answer» D. Worms | |
| 26. | Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.$ | 
| A. | a good | 
| B. | not so good | 
| C. | very good social engineering practice | 
| D. | a bad | 
| Answer» E. | |
| 27. | What is the ethics behind training how to hack a system? | 
| A. | To think like hackers and know how to defend such attacks | 
| B. | To hack a system without the permission | 
| C. | To hack a network that is vulnerable | 
| D. | To corrupt software or service using malware | 
| Answer» B. To hack a system without the permission | |