Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

(1) Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
[A] Malware
[B] Botnet
[C] Trojan horse
[D] Spyware
Answer: Spyware
(2) What is a computer worm?
[A] It is software designed to exploit networks.
[B] It is software designed to analyze and search for open ports.
[C] It is a software utilized to scan packets on open networks.
[D] It is malware designed to infect other computers.
Answer: It is malware designed to infect other computers.

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

Article and Schedule Quiz Start Test!
(3) Is a Unix-based system vulnerable to viruses?
[A] Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
[B] Yes, the majority of viruses attack Unix-based systems.
[C] No. Linux systems are totally impervious to attacks.
[D] Yes, however the majority are coded to attack Windows-based systems.
Answer: Yes, however the majority are coded to attack Windows-based systems.
(4) Which of the following protocol used Port 443 and Port 80 respectively
[A] HTTPS and HTTP
[B] XHTML
[C] HTTP and HTTPS
[D] DHTML
Answer: HTTPS and HTTP
(5) Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
[A] Backdoor
[B] Masquerading
[C] Phishing
[D] Trojan Horse
Answer: Backdoor
(6) What does TCP mean?
[A] Total Content Positioning
[B] Transmission Control Protocol
[B] Transmittable Constant Protocol
[B] Technical Control Panel
Answer: Transmission Control Protocol
(7) What does cross-site scripting allow for attackers?
[A] Direct introduction of viruses into a victims computer.
[B] The introduction of worm viruses into the victims website.
[C] A phishing attack that automatically downloads the victims personal information.
[D] Injection of client-side scripts into web pages.
Answer: Injection of client-side scripts into web pages.
(8) Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
[A] Botnet
[B] Spyware
[B] Trojan horse
[B] Malware
Answer: Botnet
(9) What are TLS and SSL?
[A] Internet protocols.
[B] Network layers.
[C] Internet layers
[D] Cryptographic protocols.
Answer: Cryptographic protocols.
(10) Who was TLS defined by?
[A] The DEA
[B] OSHA
[C] Internet Engineering Task Force
[D] NSA
Answer: Internet Engineering Task Force
(11) Modern secure password storage should implement:
[A] Salted plain-text values of the password
[B] Hashed values of the password
[C] Plain-text passwords stored in an encrypted database
[D] Salted and hashed values of the password
Answer: Salted and hashed values of the password
(12) What is network topology?
[A] It is the inner networkings of a single computer.
[B] It is the top layer of a computer network.
[C] It is the framework of the components of a computer network.
[D] It is the entirety of the data of a computer network.
Answer: It is the framework of the components of a computer network.
(13) Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
[A] Spware .
[B] Virus
[C] Trojan Horse
[D] Botnets
Answer: Trojan Horse
(14) What is another name for Internet Layer?
[A] TCP layer
[B] Interwebs
[C] IP layer
[D] SSL layer
Answer: IP layer
(15) Which of the following is the collective name for Trojan horses, spyware, and worms?
[A] Spware
[B] Botnets
[C] Virus
[D] Malware
Answer: Malware
(16) When cookies are used as session identifiers, how are they then used as a potential security hazard?
[A] They emulate user's by downloading all the victims information onto a virtual machine.
[B] User's cookies are altered to a virus-like state.
[B] They emulate user's by stealing their personal identity.
[B] Attackers emulate users by stealing their cookies.
Answer: Attackers emulate users by stealing their cookies.
(17) Which of the following is a valid flaw of SSL 2.0 ?
[A] It does not have any protection for the handshake
[B] Identical cryptographic keys are used for message authentication and encryption
[C] It has a weak MAC construction that uses the MD5 hash function with a secret prefix
[D] All of the given options are correct
Answer: All of the given options are correct
(18) Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
[A] X.507
[B] X.519
[C] X.508
[D] X.509
Answer: X.509
(19) Trojan Horse programs operate with what intent?
[A] To slowly but surely infect and become your operating system until the system crashes.
[B] To openly exploit a systems weaknesses until the user discovers it.
[C] To masquerade as non-malicious software while exploiting a system's weaknesses.
[D] To do a series of brute force attacks within the system itself and a series of external attacks from other servers
Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
(20) Why is a virtual machine considered a sandboxing method?
[A] Virtual machines all have firewalls, virus scanners, and proxy connetions.
[B] Virtual machines all have sandbox features installed on them.
[B] Virtual machines take the brunt of the attack, so the user is always safe.
[B] All host resources are channeled through the emulator.
Answer: All host resources are channeled through the emulator.

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!