Cyber Security MCQ: Top 25 Multiple Choice Question on Cyber Security with answers are given below.
Solved Cyber Security MCQs
1. Select the layer that compromises the components of physical and geographical network by means of data travels.
Cyber Personal Layer
Network Layer
Physical Layer
Logical Layer
2. This property refers to the intangible nature of cyber domain to provide seamless data sharing and communications.
Ambiguity
Connectivity
Virtuality
Interactivity
3. Identify the type of security that protects information from illegal access or theft thereby preserving the user privacy.
Information Security
Cyber Security
Network Security
Application Security
4. Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?
Cyber crime
Cyber warfare
Hacking
Cyber Attack
5. Recall the attack that consumes network bandwidth and flood the networks with data.
Protocol attack
Volume based attack
Application attack
Organized attack
6. Label the serious type of Ad-hoc attack.
Access attack
Passive attack
Application attack
Malware attack
7. Figure out the action of pretending to be a licensed venture and sending fake e-mails to users.
Phishing
Spamming
Baiting
All the above
8. Indicate the type of attack which is used for scattering Malware.
Drive-by download attack
Phishing
Eavesdropping
Birthday attack
9. Recognize the type of threat where one has physical access to the network with authorized account or server access.
External threats
Structured threats
Internal threats
Unstructured threats
10. Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.
Trojans
File Infectors
Polymorphic Viruses
Viruses
11. Point out the type of DoS attack where fragmented packets are sent to the target machine.
Botnet
Tear drop attack
Ping of death attack
Smurf attack
12. Recall the type of malwares which are basically attached to executable code or exe files.
Macro viruses
Worms
Trojans
File infectors
13. Give examples for Ransomware.
Wannacry
CoinMiner
Smoke Leader
Emotet
14. Understanding how and why the attack happens is often very important to mitigate the Cyber Attacks.
True
False
15. A complete Intrusion Detection System requires both signature-based methods and anomaly-based procedures.
True
False
16. Anomaly based IDS creates a trust-worthy activity model.
True
False
17. Intrusion Prevention Systems are usually located behind a firewall to function as another filter for malicious activity.
True
False
18. NIPS enhances the security of proprietary network.
True
False
19. An IPS must have a file storage.
True
False
20. Which of the following is correct?
Risk=threat x vulnerability
Threat=risk x vulnerability
Vulnerability=risk +threat
Risk=threat – vulnerability
21. This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning.
Port scanning
Host scanning
Network scanning
Scanner
22. Which of the following is a risk management strategy?
Risk capacity and need determination
Apply suitable policies and related controls
Consider stakeholder’s perception
All the above
23. Security compromise in a network occurs mainly due to this.
Intrusions
Internet Connections
Unauthorized Access
Wireless Connection
24. These are technical extension of IDS.
Intrusion Prevention System
Anti-Virus
Firewall
Anti-Malware
25. Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits?
Intrusion Detection System
Intrusion Prevention System
Vulnerability Assessment System
Risk Management Strategy