JOIN ADRE 2.0 Telegram Group

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Questions
1 How can cookies be used to mitigate cross-site scripting?
A Cookies can be coded like a program to intercept script attacks.
B Cookies store an exact mirror copy of all a users web activity.
C Cookies allow for cookie-based user authentication.
D They can't. Cookies only store user information.

Answer: Cookies allow for cookie-based user authentication.
2 Which of the following uses asymmetric cryptography ?
A VoIP
B SSL
C Both VoIP and SSL
D None of these

Answer: Both VoIP and SSL
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following is not a VALID type of firewall?
A Application-level gateways
B Circuit-level gateways
C Proxy Server Gateways
D Packet filters

Answer: Proxy Server Gateways
4 What is the less secure AES encryption mode?
A CFB
B OCB
C ECB
D CBC

Answer: CBC
5 What is a method to fend off a Sockstress attack?
A Do nothing. It will pass on its own.
B Prepare a retaliatory DDOS attack
C Black-listing access to TCP services on critical systems
D White-listing access to TCP services on critical systems.

Answer: White-listing access to TCP services on critical systems.
6 Which of the following HTTP method is considered insecure ?
A POST
B DELETE
C TRACE
D GET

Answer: TRACE
7 Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
A Private key transport key
B Public signature verification key
C Private ephemeral key agreement key
D Public authentication key

Answer: Private ephemeral key agreement key
8 What does the Linux kernal use to sandbox running programs?
A Linux doesn't sandbox because it is impervious to any and all cyber attacks
B Linux uses a layered system of user authentication to perform sandbox-like functions.
C seccomp, or Secure Computing Mode
D Linux drives are fully encrypted, thus they don't need sandboxing.

Answer: seccomp, or Secure Computing Mode
9 Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
A Public ephemeral key agreement key
B Asymmetric random number generation keys
C Symmetric random number generation keys
D Private ephemeral key agreement key

Answer: Private ephemeral key agreement key
10 What does a cryptographic key do within the Internet Layer?
A It specifies how encrypted data is transferred and to whom.
B It specifies how transferred information is converted into cyphertext.
C It converts it into encrypted language.
D It is the specialized dataset that is able to decrypt cyphertext.

Answer: It specifies how transferred information is converted into cyphertext
11 What is the difference between a worm and virus?
A A worm does not replicate itself like a virus does, but rather moves from computer to computer
B A virus infects files, while a worm eats them
C A worm is a virus created for a very specific purpose
D Unlike a virus, a worm does not need to attach itself to a program to spread.

Answer: Unlike a virus, a worm does not need to attach itself to a program to spread.
12 Which of the following represents a cryptographic key that is intended to be used for a long period of time?
A Private key transport
B key Public authentication
C signature verification key
D Private static key agreement key

Answer: Private static key agreement key
13 Which of the following is a VALID ephemeral key?
A Asymmetric ephemeral random number generation keys
B Public ephemeral verification key
C Symmetric ephemeral random number generation keys
D Public ephemeral key agreement key

Answer: Public ephemeral key agreement key
14 Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
A Public Key Infrastructure
B Virtual Key Infrastructure
C Private Key Infrastructure
D All of the given options are correct

Answer: Public Key Infrastructure
15 Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
A Symmetric random number generation keys
B Asymmetric random number generation keys
C Symmetric key wrapping key
D Public signature verification key

Answer: Symmetric key wrapping key
16 Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
A Symmetric random number generation keys
B Asymmetric random number generation keys
C Symmetric key wrapping key
D Public signature verification key

Answer: Symmetric key wrapping key
17 Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
A Virus
B Spyware
C Fraudtool
D Malware

Answer: Fraudtool
18 In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections? session layer application layer
A presentation layer
B Both session and presentation layer
C session layer
D application layer

Answer: application layer
19 Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
A Public signature verification key
B Private signature key
C Public key transport key
D Private key transport key

Answer: Public key transport key
20 Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
A Private signature key
B Private key transport key
C Public signature verification key
D Public authentication key

Answer: Private key transport key

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series