MCQ Cyber Security
MCQ Cyber Security
a. Phishing
b. Bulling
c. Stalking
d. Identity theft
Answer: c
2) Which one of the following can be considered as the class of computer threats?
a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C
Answer: a
Explanation: A dos attack refers to the denial of service attack. It is a kind of cyber
attack in which one tries to make a machine (or targeted application, website
etc.) unavailable for its intended users. It is usually accomplished by disturbing
the service temporarily or indefinitely of the target connected to the internet.
a. Virus
b. Malware
c. Spam
d. All of the above
Answer: c
4) Which of the following usually observe each activity on the internet of the
victim, gather all information in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above
Answer: b
a. Malware
b. Adware
c. Antivirus
d. Both B and C
Answer: c
a. Quick heal
b. Mcafee
c. Kaspersky
d. All of the above
Answer: d
a. Antivirus
b. Firewall
c. Cookies
d. Malware
Answer: b
Explanation: There are two types of firewalls - software programs and hardware-
based firewalls. These types of firewalls filter each and every data packet coming
from the outside environment such as network; internet so that any kind of virus
would not be able to enter in the user's system. In some cases where the firewall
detects any suspicious data packet, it immediately burns or terminates that data
packet. In short, we can also say that it is the first line of defense of the system to
avoid several kinds of viruses.
8) Which of the following refers to stealing one's idea or invention of others and
use it for their own benefits?
a. Piracy
b. Plagiarism
c. Intellectual property rights
d. All of the above
Answer: d
Explanation: The stealing ideas or the invention of others and using them for their
own profits can also be defined in several different ways, such as piracy,
intellectual property rights, and plagiarism.
9) Read the following statement carefully and find out whether it is correct about
the hacking or not?
It can be possible that in some cases, hacking a computer or network can be legal.
Answer: b
10) Which of the following refers to exploring the appropriate, ethical behaviors
related to the online environment and digital media platform?
a. Cyber low
b. Cyberethics
c. Cybersecurity
d. Cybersafety
Answer: b
a. Access control
b. Confidentiality
c. Availability
d. All of the above
Answer: c
12) Which one of the following refers to the technique used for verifying the
integrity of the message?
a. Digital signature
b. Decryption algorithm
c. Protocol
d. Message Digest
Answer: d
a. Aircrack-ng
b. Wireshark
c. Norton
d. All of the above
Answer: a
14) Which of the following port and IP address scanner famous among the users?
Answer: b
Explanation: Angry IP Scanner is a type of hacking tool that is usually used by both
white hat and black hat types of hackers. It is very famous among the users
because it helps to find the weaknesses in the network devices.
15) In ethical hacking and cyber security, there are _______ types of scanning:
a. 1
b. 2
c. 3
d. 4
Answer: c
Explanation: There are usually three types of scanning in ethical hacking and
cyber security. Therefore the correct answer is C.
Answer: b
Explanation: Among the following-given options, the Cloud Scan is one, and only
that is not a type of scanning.
17) In system hacking, which of the following is the most crucial activity?
a. Information gathering
b. Covering tracks
c. Cracking passwords
d. None of the above
Explanation: While trying to hack a system, the most important thing is cracking
the passwords.
Answer: a
Explanation: The vulnerability, port, and network scanning are three types of
scanning.
19) Which one of the following is actually considered as the first computer virus?
a. Sasser
b. Blaster
c. Creeper
d. Both A and C
Answer: c
Explanation: The Creeper is called the first computer virus as it replicates itself (or
clones itself) and spread from one system to another. It is created by Bob Thomas
at BBN in early 1971 as an experimental computer program.
20) To protect the computer system against the hacker and different kind of
viruses, one must always keep _________ on in the computer system.
a. Antivirus
b. Firewall
c. Vlc player
d. Script
Answer: b
a. An Antivirus Program
b. A photo editing software
c. A computer virus
d. A video editing software
Answer: c
Explanation: Cod Red is a type of Computer virus that was first discovered on 15
July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it
infects almost 300,000 servers.
22) Which of the following can be considered as the elements of cyber security?
a. Application Security
b. Operational Security
c. Network Security
d. All of the above
Answer: d
23) Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user's system?
Answer: d
a. Maliciousware
b. Badware
c. Ilegalware
d. Malware
Answer: d
25) Hackers usually used the computer virus for ______ purpose.
Answer: d
a. WPA
b. WPA2
c. WPS
d. Both A and C
Answer: b
Explanation: Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely
used protocols because it offers a more secure connection rather than the WPA.
It is also known as the upgraded version of the WPA protocol.
Answer: b
Explanation: The term "TCP/IP" stood for Transmission Control Protocol/ internet
protocol and was developed by the US government in the early days of the
internet.
28) The response time and transit time is used to measure the ____________ of a
network.
a. Security
b. Longevity
c. Reliability
d. Performance
Hide Answer Workspace
Answer: d
Explanation: On the basis of response time and transit time, the performance of a
network is measured.
29) Which of the following factor of the network gets hugely impacted when the
number of users exceeds the network's limit?
a. Reliability
b. Performance
c. Security
d. Longevity
Answer: d
Explanation: When the numbers of users on a network get increased and exceed
the network's limit, therefore the performance is one of the factors of the
network that is hugely impacted by it.
30) In the computer networks, the encryption techniques are primarily used for
improving the ________
a. Security
b. Performance
c. Reliability
d. Longevity
Answer: a
Explanation: Encryption techniques are usually used to improve the security of
the network. So the correct answer will be A.
Answer: b
a. 1970
b. 1971
c. 1972
d. 1969
Answer: b
Explanation: In 1970, the world's first computer virus was created by Robert
(Bob) Thomas. This virus was designed as it creates copies of itself or clones itself
and spreads one computer to another. So the correct answer will be 1970.
33) Which of the following is considered as the world's first antivirus program?
a. Creeper
b. Reaper
c. Tinkered
d. Ray Tomlinson
Answer: b
34) Which one of the following principles of cyber security refers that the security
mechanism must be as small and simple as possible?
a. Open-Design
b. Economy of the Mechanism
c. Least privilege
d. Fail-safe Defaults
Answer: b
a. Least privilege
b. Open-Design
c. Fail-safe Defaults
d. None of the above
Answer: c
36) Suppose an employee demands the root access to a UNIX system, where you
are the administrator; that right or access should not be given to the employee
unless that employee has work that requires certain rights, privileges. It can be
considered as a perfect example of which principle of cyber security?
a. Least privileges
b. Open Design
c. Separation of Privileges
d. Both A & C
Answer: a
Explanation: The example given in the above question refers to the least
privileges principle of cyber security. The least privileges principle of cyber
security states that no rights, access to the system should be given to any of the
employees of the organization unless he/she needs those particular rights, access
in order to complete the given task. In short, we can say that its primary work is
to restrict or control the assignment of rights to the employees.
37) Which of the following can also consider as the instances of Open Design?
a. CSS
b. DVD Player
c. Only A
d. Both A and B
Answer: d
38) Which one of the following principles states that sometimes it is become
more desirable to rescored the details of intrusion that to adopt more efficient
measure to avoid it?
Answer: b
Explanation: The principle called compromise factor states that in some cases, it
is more beneficial to records or document the details of the intrusion that to
adopt more efficient measures to avoid it.
39) The web application like banking websites should ask its users to log-in again
after some specific period of time, let say 30 min. It can be considered as an
example of which cybersecurity principle?
a. Compromise recording
b. Psychological acceptability
c. Complete mediation
d. None of the above
Answer: c
40) Which one of the following statements is correct about Email security in the
network security methods?
Answer: c
41) Which of the following statements is true about the VPN in Network security?
Answer: d
Explanation: The term VPN stands for Virtual Private Network. It is a type of
network security-enhancing tool that can be either a software program or a
hardware device. It usually authenticates the communication between a device
and a network by creating a secure encrypted virtual "tunnel". In general, the
software VPNs are considered as the most cost-effective, user friendly over the
hardware VPNs.
42) Which of the following type of text is transformed with the help of a cipher
algorithm?
a. Transformed text
b. Complex text
c. Scalar text
d. Plain text
Answer: d
Answer: c
44) Which type of the following malware does not replicate or clone them self's
through infection?
a. Rootkits
b. Trojans
c. Worms
d. Viruses
Answer: b
Explanation: The Trojans type of malware does not generate copies of them self's
or clone them. The main reason why these types of viruses are referred to as the
Trojans is the mythological story of the Greeks. In which some top-level
accessions were hidden in the big wooden horse-like structure and given to the
enemy as a gift. So that they can enter to the enemy's palace without come in any
sight.
45) Which of the following malware's type allows the attacker to access the
administrative controls and enables his/or her to do almost anything he wants to
do with the infected computers.
a. RATs
b. Worms
c. Rootkits
d. Botnets
Answer: a
Answer: a
Explanation: Trojans are a type of malware that will perform any types of actions
for those they are design or programmed. Another important thing about Trojans
is that the user may not know that the malware enters their system until the
Trojan starts doing its job for which they are programmed.
47) Which of the following is just opposite to the Open Design principle?
Answer: a
48) Which of the following is a type of independent malicious program that never
required any host program?
a. Trojan Horse
b. Worm
c. Trap Door
d. Virus
Answer: b
49) Which of the following usually considered as the default port number of
apache and several other web servers?
a. 20
b. 40
c. 80
d. 87
Answer: c
Explanation: The default port number used by the apache and several other web
servers is 80. So the correct answer will be C.
a. Hex
b. Binary
c. IP
d. URL
Answer: d
Explanation: DNS stands for the Domain name system; the main work of a DNS is
to translate the Domain name into an IP address that is understandable to the
computers.
a. Windows 8
b. Red Hat Linux
c. BSD Linux
d. Microsoft Office
Answer: d
Explanation: Microsoft office is a type of software used for creating and managing
documents, which is one of the most famous products of the Microsoft
organization. So the correct answer will be the D.
52) In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
Explanation: CIA refers to Confidentiality, Integrity, and Availability that are also
considered as the CIA triad. However, the CIA triad does not involve Authenticity.
a. CIA Triad
b. Confidentiality
c. Authenticity
d. None of the above
Answer: a
54) Why are the factors like Confidentiality, Integrity, Availability, and
Authenticity considered as the fundamentals?
Answer: c
Explanation: Confidentiality, Integrity, Availability and Authenticity all these four
elements helps in understanding security and its components.
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
Answer: a
56) Which one of the following is considered as the most secure Linux operating
system that also provides anonymity and the incognito option for securing the
user's information?
a. Ubuntu
b. Tails
c. Fedora
d. All of the above
Answer: b
57) Which type following UNIX account provides all types of privileges and rights
which one can perform administrative functions?
a. Client
b. Guest
c. Root
d. Administrative
Answer: d
Explanation: If a user uses the Root account of the UNIX operating system, he can
carry out all types of administrative functions because it provides all necessary
privileges and rights to a user.
a. OSCON
b. DEVON
c. DEFCON
d. SECTION
Answer: c
Explanation: DEFCON is one of the most popular and largest Hacker's as well as
the security consultant's conference. It is always held once a year in Las Vegas,
Nevada, where hackers of all types (such as black hats, gray hats, and white hat
hackers), government agents as well as security professionals from around the
world attend the conference attends this meeting.
59) Which of the following known as the oldest phone hacking techniques used by
hackers to make free calls?
a. Phreaking
b. Phishing
c. Cracking
d. Spraining
Answer: a
a. John Draper
b. Kevin Mitnick
c. John von Neumann
d. Kevin Poulsen
Answer: d