

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Possible threat to any information cannot be ________________ |
A. | reduced |
B. | transferred |
C. | protected |
D. | ignored |
Answer» E. | |
2. |
Lack of access control policy is a _____________ |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» D. Attack | |
3. |
_______ technology is used for analyzing and monitoring traffic in network and information flow.a) Cloud access security brokers (CASBs)b) Managed detection and response (MDR)c) Network Security Firewalld) Network traffic analysis (NT |
A. | Cloud access security brokers (CASBs) |
B. | Managed detection and response (MDR) |
C. | Network Security Firewall |
D. | Network traffic analysis (NTA) |
Answer» E. | |
4. |
POSSIBLE_THREAT_TO_ANY_INFORMATION_CANNOT_BE_________________?$ |
A. | reduced |
B. | transferred |
C. | protected |
D. | ignored |
Answer» E. | |
5. |
LACK_OF_ACCESS_CONTROL_POLICY_IS_A______________?$ |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» D. Attack | |
6. |
Compromising confidential information comes under ________? |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» C. Vulnerability | |
7. |
_______ technology is used for analyzing and monitoring traffic in network and information flow. |
A. | Cloud access security brokers (CASBs) |
B. | Managed detection and response (MDR) |
C. | Network Security Firewall |
D. | Network traffic analysis (NTA) |
Answer» E. | |
8. |
The full form of EDR is _______ |
A. | Endpoint Detection and recovery |
B. | Early detection and response |
C. | Endpoint Detection and response |
D. | Endless Detection and Recovery |
Answer» D. Endless Detection and Recovery | |
9. |
Which of the following information security technology is used for avoiding browser-based hacking? |
A. | Anti-malware in browsers |
B. | Remote browser access |
C. | Adware remover in browsers |
D. | Incognito mode in a browser |
Answer» C. Adware remover in browsers | |
10. |
_____ platforms are used for safety and protection of information in the cloud. |
A. | Cloud workload protection platforms |
B. | Cloud security protocols |
C. | AWS |
D. | One Drive |
Answer» B. Cloud security protocols | |
11. |
From the options below, which of them is not a vulnerability to information security? |
A. | flood |
B. | without deleting data, disposal of storage media |
C. | unchanged default password |
D. | latest patches and updates not done |
Answer» B. without deleting data, disposal of storage media | |
12. |
From the options below, which of them is not a threat to information security? |
A. | Disaster |
B. | Eavesdropping |
C. | Information leakage |
D. | Unchanged default password |
Answer» E. | |
13. |
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
A. | Network Security |
B. | Database Security |
C. | Information Security |
D. | Physical Security |
Answer» D. Physical Security | |