Explore topic-wise MCQs in Cyber Security.

This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

101.

Strangers cannot cause much trouble if we connect to them over social media.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
102.

Which of the following is not an example of DNS hijacking?

A. ISP DNS hijacking
B. DNS hijacking for phishing
C. DNS hijacking for pharming
D. HTTP-based DNS hacking
Answer» E.
103.

_____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.

A. IM – Trojans
B. Backdoor Trojans
C. Trojan-Downloader
D. Ransom Trojan
Answer» E.
104.

The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.

A. Cookie removers
B. Private Search Engines
C. Tor browser
D. VPNs
Answer» D. VPNs
105.

________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.

A. Voice
B. SMS
C. Search engine
D. Email
Answer» D. Email
106.

_____________ can be attained by the use of malware or by changing the server’s settings.

A. DNS poisoning
B. DNS cracking
C. DNS hijacking
D. DNS redirecting
Answer» D. DNS redirecting
107.

_____________ will not recreate the original source file created by the compiler.

A. Debugger
B. Hex Editor
C. Decompiler
D. Disassembler
Answer» D. Disassembler
108.

XSS stands for _________________

A. Crack Site Scripting
B. Cross Site Server
C. Cross Site Scripting
D. Crack Server Scripting
Answer» D. Crack Server Scripting
109.

The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.

A. network level
B. physical level
C. application level
D. data level
Answer» B. physical level
110.

Which of the following is not an example or type of phishing?

A. Spear phishing
B. Deceptive phishing
C. Whaling
D. Monkey in the Middle
Answer» E.
111.

___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing.

A. Network Layer DoS
B. Physical Layer DoS
C. Transport Layer DoS
D. Application Layer DoS
Answer» E.
112.

Which of the following is not a sniffing tool?

A. Wireshark
B. Dude Sniffer
C. Maltego
D. Look@LAN
Answer» D. Look@LAN
113.

Which of the following is not an appropriate countermeasure for web server hacking ?

A. Using OS or antivirus without updates
B. Scan web server applications for vulnerabilities
C. Using secure protocols
D. Follow strict access control policy
Answer» B. Scan web server applications for vulnerabilities
114.

Which among the following is not a symptom of your system compromised with adware?

A. Website links redirect to sites unlike from what user is intended
B. Web browser acts slows to a crawl
C. System takes restarts frequently
D. The browser might crash frequently
Answer» D. The browser might crash frequently
115.

A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.

A. Zone file
B. Robot file
C. Bot file
D. DNS file
Answer» B. Robot file
116.

The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» C. Website attack
117.

In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.

A. phishing
B. spoofing
C. hijacking
D. vishing
Answer» C. hijacking
118.

_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» D. Tracking cookies
119.

Which of the following is not a function or use of disassembler?

A. Extracting functions & libraries
B. Extracting strings and values
C. Assemble medium-level codes
D. Dissect binary codes
Answer» D. Dissect binary codes
120.

A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
121.

______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development.

A. Reverse hacking
B. Cracking
C. Social engineering
D. Reverse engineering
Answer» E.
122.

Creators of _____________ also sell your browsing behaviour & information to 3rd parties.

A. Shareware
B. Spyware
C. URL
D. Adware
Answer» E.
123.

_________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website.

A. Algo-based phishing
B. Email-based phishing
C. Domain Phishing
D. Vishing
Answer» C. Domain Phishing
124.

Which of the following is not a disassembler tool?

A. IDA Pro
B. PE Explorer
C. Turbo C
D. W32DASM
Answer» D. W32DASM
125.

A _____________ takes executable file as input and tries to generate high level code.

A. Debugger
B. Decompiler
C. Disassembler
D. Hex Editor
Answer» C. Disassembler
126.

Direct Action Virus is also known as ___________

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» B. Boot Sector Virus
127.

________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

A. Boot Sector Virus
B. Direct Action Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» C. Polymorphic Virus
128.

In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

A. Apple I
B. Apple II
C. Apple III
D. Apple Virus
Answer» C. Apple III