Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Whaling is the technique used to take deep and _________ information about any individual.

A. sensitive
B. powerful
C. useless
D. casual
Answer» B. powerful
2.

In IP address, IP is abbreviated as __________

A. Internet Program
B. Internet Protocol
C. Intuition Programs
D. Internet Pathway
Answer» C. Intuition Programs
3.

Finding & publishing any user’s identity with the help of different personal details is called ________

A. Doxing
B. Data breaching
C. Personal data copying
D. Secure File Transferring Protocol
Answer» B. Data breaching
4.

________ is an attack technique occurs when excess data gets written to a memory block.

A. Over buffering
B. Buffering
C. Buffer overflow
D. Memory full
Answer» D. Memory full
5.

Adware are pre-chosen _______ developed to display ads.

A. banner
B. software
C. malware
D. shareware
Answer» C. malware
6.

Backdoors are also known as ____________

A. Trap doors
B. Front doors
C. Cover doors
D. Back entry
Answer» B. Front doors
7.

________ automates an action or attack so that repetitive tasks are done at a faster rate.

A. Auto-bots
B. Cookie-bots
C. Robots
D. Bots
Answer» E.
8.

Data masking is also known as _________

A. Data obfuscation
B. Data copying
C. Data breaching
D. Data duplicating
Answer» B. Data copying
9.

_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.

A. Data copying
B. Data masking
C. Data breaching
D. Data duplicating
Answer» C. Data breaching
10.

_________ is an act of hacking by the means of which a political or social message is conveyed.

A. Hacktivism
B. Whistle-blowing
C. Surveillance
D. Pseudonymization
Answer» B. Whistle-blowing
11.

________ is a way to breach the security by using the vulnerability of that system.

A. Threat
B. Vulnerability
C. Exploit
D. Attack
Answer» D. Attack
12.

An/A ________ is an act that violates cyber-security.

A. Threat
B. Vulnerability
C. Exploit
D. Attack
Answer» E.
13.

When any IT product, system or network is in need for testing for security reasons, then the term used is called _________

A. Threat
B. Vulnerability
C. Target of Evaluation
D. Attack
Answer» D. Attack
14.

Existence of weakness in a system or network is called _______

A. Threat
B. Vulnerability
C. Exploit
D. Attack
Answer» C. Exploit
15.

________ is any action that might compromise cyber-security.

A. Threat
B. Vulnerability
C. Exploit
D. Attack
Answer» B. Vulnerability