Explore topic-wise MCQs in Cyber Security.

This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

App permissions can cause trouble as some apps may secretly access your memory card or contact data.

A. True
B. False
Answer» B. False
2.

____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose.

A. MS Windows Defender
B. MSE
C. BitLocker
D. MS Office
Answer» D. MS Office
3.

________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware.

A. Norton Antivirus
B. Windows Defender
C. Anti-malware
D. Microsoft Security Essentials
Answer» C. Anti-malware
4.

The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference.

A. system, administrator
B. system, user
C. group, user
D. user, administrator
Answer» B. system, user
5.

A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication.

A. Trusted Platform Mode
B. Trusted Protocol Module
C. Trusted Privacy Module
D. Trusted Platform Module
Answer» E.
6.

_______________ are based on dictionary attack techniques.

A. Hybrid attacks
B. Network attacks
C. TCP attacks
D. Database attacks
Answer» B. Network attacks
7.

_____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.

A. Syllable attack
B. Rule-based attack
C. Offline attack
D. Hybrid attack
Answer» E.
8.

Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.

A. Syllable attack
B. Rule-based attack
C. Offline attack
D. Hybrid attack
Answer» C. Offline attack
9.

____________ attack is a combination of Dictionary attack & brute force attack.

A. Syllable
B. Syllabi
C. Database
D. Phishing
Answer» B. Syllabi
10.

________________ attacks are carried out from a location other than the real computer where the password reside or was used.

A. passive online
B. active online
C. offline password
D. non-electronic
Answer» D. non-electronic
11.

Which of the following is not an example of a passive online attack?

A. MiTM
B. Reply Attack
C. Phishing
D. Wire sniffing
Answer» D. Wire sniffing
12.

Which of them is not an example of business email security tool?

A. Microsoft Office Trust Center
B. Sendinc
C. Hushmail Business
D. Cisco Jabber
Answer» E.
13.

_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.

A. Social Engineering
B. Phishing
C. Cookie Stealing
D. Banner Grabbing
Answer» C. Cookie Stealing
14.

Which of them is an example of grabbing email information?

A. Cookie stealing
B. Reverse engineering
C. Port scanning
D. Banner grabbing
Answer» B. Reverse engineering
15.

Which of the following is a non-technical type of intrusion or attack technique?

A. Reverse Engineering
B. Malware Analysis
C. Social Engineering
D. Malware Writing
Answer» D. Malware Writing
16.

Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.

A. trojans, redirected malicious URLs
B. antivirus, patches
C. cracked software, redirected malicious URLs
D. malware, security patches
Answer» B. antivirus, patches
17.

Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?

A. Zeus
B. Stuxnet
C. Reaper Exploit
D. Friday the 13
Answer» D. Friday the 13
18.

If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

A. memory
B. quarantine
C. cookies
D. hard drive
Answer» D. hard drive
19.

BTS stands for ___________________

A. Basement Transceiver Server
B. Base Transmitter Station
C. Base Transceiver Server
D. Base Transceiver Station
Answer» E.
20.

When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________

A. AP-handshaking
B. 4-way handshake
C. 4-way connection
D. wireless handshaking
Answer» C. 4-way connection
21.

There are __________ types of wireless authentication modes.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
22.

WPS stands for __________________

A. WiFi Protected System
B. WiFi Protected Setup
C. WiFi Protocol Setup
D. Wireless Protected Setup
Answer» C. WiFi Protocol Setup