JOIN ADRE 2.0 Telegram Group

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Questions
1 When is encrypted data the safest?
A When it is being transferred via usb stick.
B When it is in transit.
C When it is being written. When it is at rest.
D When it is being written.

Answer: When it is being written. When it is at rest.
2 Which of the following keys are used to generate random numbers?
A Symmetric random number generation keys
B Symmetric and asymmetric random number generation keys
C Public signature verification key
D Asymmetric random number generation keys

Answer: Symmetric and asymmetric random number generation keys
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following is true about Public Key Encryption?
A Anyone can encrypt with the public key and anyone can decrypt with the private key
B Anyone can encrypt with the public key, only one person can decrypt with the private key
C Anyone can encrypt with the private key, only one person can decrypt with the public key
D Only one person can encrypt with the public key and anyone can decrypt with the private key

Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key
4 If you set up a BUS network, what is the major disadvantage?
A It is entirely wireless and open to wifi-based attacks.
B It is daisy-chained together with several cables
C It is linked with a single cable which can be a major vulnerability.
D It is connected in a star pattern and can be disabled by disrupting one data center.

Answer: It is linked with a single cable which can be a major vulnerability.
5 What does the acronym BEAST mean in Beast Attack?
A Breaking and Entering Against SSL/TLS
B Browser Extension And SSL/TLS
C Browser Exploit Against SSL/TLS
D Breach Entering Against SSL/TLS

Answer: Browser Exploit Against SSL/TLS
6 TCP is used for what three main functions?
A Connect to the Web, deliver email, and transfer files.
B Connect to the Web, compress data, encrypt mail.
C Connect to the web, conceal data, transfer files.
D Connect to the Web, encrypt data, transmit information.

Answer: Connect to the Web, deliver email, and transfer files.
7 Secure cookies have which feature?
A They are not encrypted, just sent via secure server.
B They are encrypted.
C Secure cookies are passed along via encrypted programs.
D Cookies are always traded between trusted users.

Answer: They are encrypted.
8 How are port numbers categorized?
A Static, dynamic, enigmatic
B Known, well-known, unknown
C Well-known, registered, and static/dynamic.
D Unknown, unregistered, invalid

Answer: Well-known, registered, and static/dynamic.
9 Which of the following type of attack can actively modify communications or data?
A Both Active and Passive attack
B Neither Active nor Passive attack
C Active attack
D Passive attack

Answer: Active attack
10 What is the top method an attacker might infect a target?
A Social engineering, or psychological manipulation.
B SQL injection.
C Buffer overflow.
D Hacking via the Internet.

Answer: Social engineering, or psychological manipulation.
11 Secure Sockets Layer is a predecessor of which cryptographic protocol?
A IPSec
B Transport Layer Security
C SSL 3.0
D HTTPS

Answer: Transport Layer Security
12 An SQL injection is often used to attack what?
A Small scale machines such as diebold ATMs
B Large-scale sequel databases such as those containing credit card information.
C Servers running SQL databases similar to Hadoop or Hive.
D Servers built on NoSQL

Answer: Large-scale sequel databases such as those containing credit card information.
13 Which version of TLS is vulnerable to BEAST exploit?
A TLS 1.1
B TLS 3.0
C TLS 2.0
D TLS 1.0

Answer: TLS 1.0
14 According to OWASP what is the most dangerous web vulnerability?
A Injections (SQL, LDAP, etc)
B Cross-site-scripting (XSS)
C Security Misconfiguration
D Cross-Site Request Forgery (CSRF)

Answer: Injections (SQL, LDAP, etc)
15 Sandboxing does what to computer programs?
A It separates and isolates them
B It separates and isolates them
C Sandboxing doesn't protect your system.
D Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.

Answer: It separates and isolates them.
16 What is largely considered the most advanced computer virus?
A Conficker Virus
B Zeus
C Stuxnet.
D Stuxnet.

Answer: Stuxnet.
17 What is necessary for a cross-site script attack with cookies to be thwarted?
A CAPTCHAs
B Virtual machines
C Proxies
D Firewalls

Answer: CAPTCHAs
18 What are the two primary classifications of cross-site scripting?
A DOM-based and persistent
B traditional and DOM-based
C traditional and non-persistent
D non-persistent and persistent.

Answer: non-persistent and persistent.
19 Which of the following is a VALID authorization key?
A Public authorization key
B Public ephemeral key authorization key
C Asymmetric authorization keys
D Symmetric authorization keys

Answer: Public authorization key
20 Which of the following is a VALID digital signature key?
A Public signature authentication key
B Private signature authentication key
C Symmetric signature authentication key
D Private signature key

Answer: Private signature key

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series