Explore topic-wise MCQs in Cyber Security.

This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the design phase is shown in below diagram?

A. Conceptual Design
B. Preliminary Design
C. First order sizing
D. Detail Design
Answer» E.
2.

What is meant by the term Lofting?

A. Specifications and Requirements
B. Conceptual Drawing
C. Mathematical modelling of the skin
D. Trade study specifications
Answer» D. Trade study specifications
3.

The main objective of the Preliminary stage is ______

A. manufacture
B. fabrication
C. first order sizing
D. lofting
Answer» E.
4.

The aim of the Preliminary Design stage is to make the company ready for the full scale development.

A. True
B. False
Answer» B. False
5.

Which of these is not part of the Conceptual Design phase?

A. Specifications and Requirements
B. Conceptual Drawing
C. First weight estimation
D. Lofting
Answer» E.
6.

Which of the following is the correct pair in chronological order?

A. Detail Design-Preliminary Design-Conceptual Design
B. Conceptual Design-Preliminary Design-Detail Design
C. Conceptual Design-Detail Design-Preliminary Design
D. Preliminary Design-Detail Design-Conceptual Design
Answer» C. Conceptual Design-Detail Design-Preliminary Design
7.

Can we use similar design phases for an Airplane and for a Helicopter?

A. True
B. False
Answer» B. False
8.

Which of the following is a correct pair?

A. Testing major parts for fabrication – Conceptual Design
B. Testing major parts for fabrication – Detail Design
C. Testing major parts for fabrication – Preliminary Design
D. Testing major parts for fabrication – Initial Design
Answer» C. Testing major parts for fabrication – Preliminary Design
9.

Which are the phases of Aircraft Design process?

A. Conceptual Design only
B. Conceptual Design, Preliminary Design and Detail Design
C. Only Preliminary Phase
D. Only Detail Design Phase
Answer» B. Conceptual Design, Preliminary Design and Detail Design
10.

The requirements of an Aircraft will fall in ______ phase.

A. surface requirement
B. preliminary design
C. detail design
D. conceptual design
Answer» E.
11.

The whole Design philosophy of an Aircraft is termed as _____

A. design wheel
B. anatomy
C. design evaluation
D. sizing
Answer» B. anatomy
12.

What is the initial phase of an Aircraft Design?

A. Conceptual Design
B. Preliminary Design
C. Detail Design
D. Sizing
Answer» B. Preliminary Design
13.

In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.

A. IP address, protocol
B. MAC address, protocol
C. IP address, IMEI number
D. MAC address, network model
Answer» B. MAC address, protocol
14.

If any given address is running live, it will return an ICMP ECHO reply.

A. True
B. False
Answer» B. False
15.

__________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.

A. Network
B. Port
C. Vulnerability
D. System
Answer» C. Vulnerability
16.

A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.

A. scan sweep
B. ping sweep
C. scan ping
D. host ping
Answer» C. scan ping
17.

Ping sweep is also known as ________________

A. ICMP Sweep
B. ICMP Call
C. IGMP Sweep
D. ICMP pinging
Answer» B. ICMP Call
18.

______________ is the unauthorized movement of data.

A. Data exfiltration
B. Data infiltration
C. Data cracking
D. Database hacking
Answer» B. Data infiltration
19.

_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.

A. Data loss prevention
B. Data loss measurement
C. Data stolen software
D. Data leak prevention
Answer» B. Data loss measurement
20.

____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups.

A. Competitive Intelligence gathering
B. Cognitive Intelligence gathering
C. Cyber Intelligence gathering
D. Competitors Info gathering
Answer» B. Cognitive Intelligence gathering
21.

Which of the following is a site used for Competitive Intelligence gathering?

A. https://www.bidigital.gov/
B. https://www.cig.com/ci/
C. https://www.coginfo.com/ci/
D. https://www.bidigital.com/ci/
Answer» E.
22.

Predict and analyze the tactics of competitors from data taken out from online data sources is a crime.

A. True
B. False
Answer» C.
23.

https://www.bidigital.com/ci/ is a website which is used for _________________

A. Competitive Intelligence gathering
B. Cognitive Intelligence gathering
C. Cyber Intelligence gathering
D. Competitors Info gathering
Answer» B. Cognitive Intelligence gathering
24.

Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details.

A. True
B. False
Answer» B. False
25.

https://archive.org is a popular site where one can enter a domain name in its search box for finding out how the site was looking at a given date.

A. True
B. False
Answer» B. False
26.

You can attain a series of IP addresses allotted to a particular company using __________ site.

A. https://www.ipdata.org/
B. https://www.arin.net/
C. https://www.ipip.com/
D. https://www.goipaddr.net/
Answer» C. https://www.ipip.com/
27.

Which of the following is not a feature of Hping2 tool?

A. Firewall testing
B. Port scanning
C. Network testing
D. Server malware scanning
Answer» E.
28.

Which of the following is not a valid scanning method?

A. Xmas Tree scan
B. SYN Stealth scan
C. Null Scan
D. Cloud scan
Answer» E.
29.

___________ is a command-line TCP/IP packet assembler and analyzer tool.

A. IGMP Ping
B. Hping2
C. Nmap
D. Maltego
Answer» C. Nmap
30.

_________________is quite an esoteric process for preventing session creation through a particular port.

A. Port knocking
B. Port cracking
C. Port hacking
D. Port-jacking
Answer» B. Port cracking