JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Questions
1 Which of the following are possible security threats?
A Illegitimate use
B Backdoors
C Masquerading
D All of the given options are correct

Answer: All of the given options are correct
2 What is a firewall?
A Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
B A firewall is a program that encrypts all the programs that access the Internet.
C A firewall is a program that keeps other programs from using the network.
D Firewalls are interrupts that automatically disconnect from the internet when a threat appears

Answer: Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
Advertisement
ADRE 2.0 Mock Test - 5 Start Test
ADRE 2.0 Mock Test - 5 Start Test

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
A Distributed denial-of-service attacks
B Backdoor
C Masquerading
D Phishing

Answer: Distributed denial-of-service attacks
4 Which of the following symmetric keys can be derived from Symmetric master key?
A Authentication keys
B Key wrapping keys
C Data encryption keys
D All of the given options are correct

Answer: All of the given options are correct
5 Which of the following are valid Cryptographic key types?
A Public authentication key
B Public signature verification key
C Private signature key
D All of the given options are correct

Answer: All of the given options are correct
6 Is true that HTTP is an insecure protocol?
A True
B False

Answer: True
7 Which is the best way a system can be hardened?
A Total disk encryption coupled with strong network security protocols.
B White-list ad filtering only.
C Installing a commercial security suite.
D Virus scanning only.

Answer: Total disk encryption coupled with strong network security protocols.
8 Why is it crucial to encrypt data in transit?
A To assure that all of your information cannot be decrypted.
B To decrease your resources.
C So you can increase your chances of testing your encryption capabilities.
D To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.

Answer: To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
9 Which of the following are the basic functionalities of the IPsec Protocol ?
A Security association for policy management and traffic processing
B Security protocols for AH and ESP
C Manual and automatic key management for the internet key exchange
D All of the given options are correct

Answer: All of the given options are correct
10 Can a proxy be used as a firewall? If so, how?
A No. Proxies are data encryption stations whose sole purpose is to encrypt and rerout data.
B No. Proxies are firewalls that are maintained at locations other than that of the user.
C No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
D Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.

Answer: Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
11 In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
A Virus
B Masquerading
C Phishing
D Malware

Answer: Phishing
12 Which of the following is TRUE about TLS?
A The HMAC construction used by most TLS cipher suites is specified in RFC 2104
B Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
C The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
D All of the given options are correct

Answer: All of the given options are correct
13 Which of the following is a VALID type of Key Management System?
A Third-Party Key Management System .
B Dynamic Key Management System
C Integrated Key Management System
D Both Integrated Key Management System and Third-Party Key Management System

Answer: Both Integrated Key Management System and Third-Party Key Management System
14 What is one way that a web browser is vulnerable to breaching?
A A browser can be infected by closing it.
B A virus can be sent through the monitor.
C A browser plugin can be exploited.
D Web browsers are impervious to exploitation.

Answer: A browser plugin can be exploited.
15 What two main categories of network topologies are there?
A Digital and Topological
B Direct and Indirect
C Close and Distant
D Physical and logical.

Answer: Physical and logical.
16 What is another name for an insecure plugin?
A Hardware
B Software
C Firmware
D Malware

Answer: Malware
17 A digital signature scheme consists of which of the following typical algorithms?
A Key generation, Signing and Signature verifying algorithm
B Signature verifying algorithm
C Key generation algorithm
D Signing algorithm

Answer: Key generation, Signing and Signature verifying algorithm
18 Which of the following is TRUE about SSL 3.0?
A It has a weak MAC construction that uses the MD5 hash function with a secret prefix
B Identical cryptographic keys are used for message authentication and encryption
C SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
D It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers

Answer: SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
19 There are two types of firewall. What are they?
A Internet-based and home-based.
B Hardware and software.
C Remote and local
D Digital and electronic.

Answer: Hardware and software.
20 True of False? Malware exists which affects both Windows and Linux systems.
A True
B False

Answer: True

ADRE 2.0 MOCK TEST

Take Mock Tests

Government Schemes Mock Test Start Test!
Political Science Mock Test – 42 Start Test
History Test – 190 Start Test
Quantitative Aptitude Test Start Test!
Trigonometry - Mock Test Start Test!
Data Interpretation - Mock Test Start Test!
General Awareness - Mock Test Start Test!
Reasoning Ability - Mock Test Start Test!
Englist(Antonyms) Mock Test 1 Start Test!
Quantitative Aptitude (Percentage) Mock Test Start Test!
Economy Mock Test 1 Unlock Test!
Books & Authors - Test 2 Unlock Test!
Advertisement