Explore topic-wise MCQs in Cyber Security.

This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

A. Malware
B. Remote Access Trojans
C. Keyloggers
D. Spyware
Answer» E.
2.

_________ are the special type of programs used for recording and tracking user’s keystroke.

A. Keylogger
B. Trojans
C. Virus
D. Worms
Answer» B. Trojans
3.

Which method of hacking will record all your keystrokes?

A. Keyhijacking
B. Keyjacking
C. Keylogging
D. Keyboard monitoring
Answer» D. Keyboard monitoring
4.

Which of them is not a wireless attack?

A. Eavesdropping
B. MAC Spoofing
C. Wireless Hijacking
D. Phishing
Answer» E.
5.

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

A. Session Hijacking
B. Session Fixation
C. Cookie stuffing
D. Session Spying
Answer» B. Session Fixation
6.

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

A. SQL injection
B. HTML Injection
C. Cross Site Scripting (XSS)
D. Cross Site Request Forgery (XSRF)
Answer» D. Cross Site Request Forgery (XSRF)
7.

WHICH_OF_THEM_IS_NOT_A_WIRELESS_ATTACK??$

A. Eavesdropping
B. MAC Spoofing
C. Wireless Hijacking
D. Phishing
Answer» E.
8.

Which method of hacking will record all your keystrokes?$

A. Keyhijacking
B. Keyjacking
C. Keylogging
D. Keyboard monitoring
Answer» D. Keyboard monitoring
9.

An_attempt_to_harm,_damage_or_cause_threat_to_a_system_or_network_is_broadly_termed_as_______$

A. Cyber-crime
B. Cyber Attack
C. System hijacking
D. Digital crime
Answer» C. System hijacking
10.

___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

A. Cyber-warfare
B. Cyber campaign
C. Cyber-terrorism
D. Cyber attack
Answer» D. Cyber attack
11.

Stuxnet is a _________

A. Worm
B. Virus
C. Trojan
D. Antivirus
Answer» B. Virus
12.

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.$

A. Malware
B. Remote Access Trojans
C. Keyloggers
D. Spyware
Answer» E.
13.

_________ are the special type of programs used for recording and tracking user’s keystroke.$

A. Keylogger
B. Trojans
C. Virus
D. Worms
Answer» B. Trojans
14.

Which of this is an example of physical hacking?

A. Remote Unauthorised access
B. Inserting malware loaded USB to a system
C. SQL Injection on SQL vulnerable site
D. DDoS (Distributed Denial of Service) attack
Answer» C. SQL Injection on SQL vulnerable site
15.

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________$

A. Session Hijacking
B. Session Fixation
C. Cookie stuffing
D. Session Spying
Answer» B. Session Fixation
16.

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

A. Database crash attack
B. DoS (Denial of Service) attack
C. Data overflow Attack
D. Buffer Overflow attack
Answer» E.
17.

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?$

A. SQL injection
B. HTML Injection
C. Cross Site Scripting (XSS)
D. Cross Site Request Forgery (XSRF)
Answer» D. Cross Site Request Forgery (XSRF)
18.

XSS is abbreviated as __________

A. Extreme Secure Scripting
B. Cross Site Security
C. X Site Scripting
D. Cross Site Scripting
Answer» E.
19.

_____________ is a code injecting method used for attacking the database of a system / website.

A. HTML injection
B. SQL Injection
C. Malicious code injection
D. XML Injection
Answer» C. Malicious code injection
20.

Who deploy Malwares to a system or network?

A. Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
B. Criminal organizations, White hat hackers, malware developers, cyber-terrorists
C. Criminal organizations, Black hat hackers, software developers, cyber-terrorists
D. Criminal organizations, gray hat hackers, Malware developers, Penetration testers
Answer» B. Criminal organizations, White hat hackers, malware developers, cyber-terrorists
21.

The full form of Malware is ________

A. Malfunctioned Software
B. Multipurpose Software
C. Malicious Software
D. Malfunctioning of Security
Answer» D. Malfunctioning of Security