GkSeries.com

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

(1) Which of the following are possible security threats?
[A] Illegitimate use
[B] Backdoors
[C] Masquerading
[D] All of the given options are correct
Answer: All of the given options are correct
(2) What is a firewall?
[A] Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
[B] A firewall is a program that encrypts all the programs that access the Internet.
[C] A firewall is a program that keeps other programs from using the network.
[D] Firewalls are interrupts that automatically disconnect from the internet when a threat appears
Answer: Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
(3) Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
[A] Distributed denial-of-service attacks
[B] Backdoor
[C] Masquerading
[D] Phishing
Answer: Distributed denial-of-service attacks
(4) Which of the following symmetric keys can be derived from Symmetric master key?
[A] Authentication keys
[B] Key wrapping keys
[C] Data encryption keys
[D] All of the given options are correct
Answer: All of the given options are correct
(5) Which of the following are valid Cryptographic key types?
[A] Public authentication key
[B] Public signature verification key
[C] Private signature key
[D] All of the given options are correct
Answer: All of the given options are correct
(6) Is true that HTTP is an insecure protocol?
[A] True
[B] False
Answer: True
(7) Which is the best way a system can be hardened?
[A] Total disk encryption coupled with strong network security protocols.
[B] White-list ad filtering only.
[C] Installing a commercial security suite.
[D] Virus scanning only.
Answer: Total disk encryption coupled with strong network security protocols.
(8) Why is it crucial to encrypt data in transit?
[A] To assure that all of your information cannot be decrypted.
[B] To decrease your resources.
[C] So you can increase your chances of testing your encryption capabilities.
[D] To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
Answer: To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
(9) Which of the following are the basic functionalities of the IPsec Protocol ?
[A] Security association for policy management and traffic processing
[B] Security protocols for AH and ESP
[C] Manual and automatic key management for the internet key exchange
[D] All of the given options are correct
Answer: All of the given options are correct
(10) Can a proxy be used as a firewall? If so, how?
[A] No. Proxies are data encryption stations whose sole purpose is to encrypt and rerout data.
[B] No. Proxies are firewalls that are maintained at locations other than that of the user.
[C] No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
[D] Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
Answer: Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
(11) In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
[A] Virus
[B] Masquerading
[C] Phishing
[D] Malware
Answer: Phishing
(12) Which of the following is TRUE about TLS?
[A] The HMAC construction used by most TLS cipher suites is specified in RFC 2104
[B] Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
[C] The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
[D] All of the given options are correct
Answer: All of the given options are correct
(13) Which of the following is a VALID type of Key Management System?
[A] Third-Party Key Management System .
[B] Dynamic Key Management System
[C] Integrated Key Management System
[D] Both Integrated Key Management System and Third-Party Key Management System
Answer: Both Integrated Key Management System and Third-Party Key Management System
(14) What is one way that a web browser is vulnerable to breaching?
[A] A browser can be infected by closing it.
[B] A virus can be sent through the monitor.
[C] A browser plugin can be exploited.
[D] Web browsers are impervious to exploitation.
Answer: A browser plugin can be exploited.
(15) What two main categories of network topologies are there?
[A] Digital and Topological
[B] Direct and Indirect
[C] Close and Distant
[D] Physical and logical.
Answer: Physical and logical.
(16) What is another name for an insecure plugin?
[A] Hardware
[B] Software
[C] Firmware
[D] Malware
Answer: Malware
(17) A digital signature scheme consists of which of the following typical algorithms?
[A] Key generation, Signing and Signature verifying algorithm
[B] Signature verifying algorithm
[C] Key generation algorithm
[D] Signing algorithm
Answer: Key generation, Signing and Signature verifying algorithm
(18) Which of the following is TRUE about SSL 3.0?
[A] It has a weak MAC construction that uses the MD5 hash function with a secret prefix
[B] Identical cryptographic keys are used for message authentication and encryption
[C] SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
[D] It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers
Answer: SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
(19) There are two types of firewall. What are they?
[A] Internet-based and home-based.
[B] Hardware and software.
[C] Remote and local
[D] Digital and electronic.
Answer: Hardware and software.
(20) True of False? Malware exists which affects both Windows and Linux systems.
[A] True
[B] False
Answer: True