JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Questions
1 Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
A Malware
B Botnet
C Trojan horse
D Spyware

Answer: Spyware
2 What is a computer worm?
A It is software designed to exploit networks.
B It is software designed to analyze and search for open ports.
C It is a software utilized to scan packets on open networks.
D It is malware designed to infect other computers.

Answer: It is malware designed to infect other computers.
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Is a Unix-based system vulnerable to viruses?
A Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
B Yes, the majority of viruses attack Unix-based systems.
C No. Linux systems are totally impervious to attacks.
D Yes, however the majority are coded to attack Windows-based systems.

Answer: Yes, however the majority are coded to attack Windows-based systems.
4 Which of the following protocol used Port 443 and Port 80 respectively
A HTTPS and HTTP
B XHTML
C HTTP and HTTPS
D DHTML

Answer: HTTPS and HTTP
5 Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
A Backdoor
B Masquerading
C Phishing
D Trojan Horse

Answer: Backdoor
6 What does TCP mean?
A Total Content Positioning
B Transmission Control Protocol
B Transmittable Constant Protocol
B Technical Control Panel

Answer: Transmission Control Protocol
7 What does cross-site scripting allow for attackers?
A Direct introduction of viruses into a victims computer.
B The introduction of worm viruses into the victims website.
C A phishing attack that automatically downloads the victims personal information.
D Injection of client-side scripts into web pages.

Answer: Injection of client-side scripts into web pages.
8 Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
A Botnet
B Spyware
B Trojan horse
B Malware

Answer: Botnet
9 What are TLS and SSL?
A Internet protocols.
B Network layers.
C Internet layers
D Cryptographic protocols.

Answer: Cryptographic protocols.
10 Who was TLS defined by?
A The DEA
B OSHA
C Internet Engineering Task Force
D NSA

Answer: Internet Engineering Task Force
11 Modern secure password storage should implement:
A Salted plain-text values of the password
B Hashed values of the password
C Plain-text passwords stored in an encrypted database
D Salted and hashed values of the password

Answer: Salted and hashed values of the password
12 What is network topology?
A It is the inner networkings of a single computer.
B It is the top layer of a computer network.
C It is the framework of the components of a computer network.
D It is the entirety of the data of a computer network.

Answer: It is the framework of the components of a computer network.
13 Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
A Spware .
B Virus
C Trojan Horse
D Botnets

Answer: Trojan Horse
14 What is another name for Internet Layer?
A TCP layer
B Interwebs
C IP layer
D SSL layer

Answer: IP layer
15 Which of the following is the collective name for Trojan horses, spyware, and worms?
A Spware
B Botnets
C Virus
D Malware

Answer: Malware
16 When cookies are used as session identifiers, how are they then used as a potential security hazard?
A They emulate user's by downloading all the victims information onto a virtual machine.
B User's cookies are altered to a virus-like state.
B They emulate user's by stealing their personal identity.
B Attackers emulate users by stealing their cookies.

Answer: Attackers emulate users by stealing their cookies.
17 Which of the following is a valid flaw of SSL 2.0 ?
A It does not have any protection for the handshake
B Identical cryptographic keys are used for message authentication and encryption
C It has a weak MAC construction that uses the MD5 hash function with a secret prefix
D All of the given options are correct

Answer: All of the given options are correct
18 Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
A X.507
B X.519
C X.508
D X.509

Answer: X.509
19 Trojan Horse programs operate with what intent?
A To slowly but surely infect and become your operating system until the system crashes.
B To openly exploit a systems weaknesses until the user discovers it.
C To masquerade as non-malicious software while exploiting a system's weaknesses.
D To do a series of brute force attacks within the system itself and a series of external attacks from other servers

Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
20 Why is a virtual machine considered a sandboxing method?
A Virtual machines all have firewalls, virus scanners, and proxy connetions.
B Virtual machines all have sandbox features installed on them.
B Virtual machines take the brunt of the attack, so the user is always safe.
B All host resources are channeled through the emulator.

Answer: All host resources are channeled through the emulator.

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement