Cyber Security MCQ (Multiple Choice Questions)

Cyber Security MCQ: Top 25 Multiple Choice Question on Cyber Security with answers are given below.

Solved Cyber Security MCQs

1. Select the layer that compromises the components of physical and geographical network by means of data travels.

 Cyber Personal Layer

 Network Layer

 Physical Layer

 Logical Layer

2. This property refers to the intangible nature of cyber domain to provide seamless data sharing and communications.

 Ambiguity

 Connectivity

 Virtuality

 Interactivity

3. Identify the type of security that protects information from illegal access or theft thereby preserving the user privacy.

 Information Security

 Cyber Security

 Network Security

 Application Security

4. Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?

 Cyber crime

 Cyber warfare

 Hacking

 Cyber Attack

5. Recall the attack that consumes network bandwidth and flood the networks with data.

 Protocol attack

 Volume based attack

 Application attack

 Organized attack

6. Label the serious type of Ad-hoc attack.

 Access attack

 Passive attack

 Application attack

 Malware attack

7. Figure out the action of pretending to be a licensed venture and sending fake e-mails to users.

 Phishing

 Spamming

 Baiting

 All the above

8. Indicate the type of attack which is used for scattering Malware.

 Drive-by download attack

 Phishing

 Eavesdropping

 Birthday attack

9. Recognize the type of threat where one has physical access to the network with authorized account or server access.

 External threats

 Structured threats

 Internal threats

 Unstructured threats

10. Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.

 Trojans

 File Infectors

 Polymorphic Viruses

 Viruses

11. Point out the type of DoS attack where fragmented packets are sent to the target machine.

 Botnet

 Tear drop attack

 Ping of death attack

 Smurf attack

12. Recall the type of malwares which are basically attached to executable code or exe files.

 Macro viruses

 Worms

 Trojans

 File infectors

13. Give examples for Ransomware.

 Wannacry

 CoinMiner

 Smoke Leader

 Emotet

14. Understanding how and why the attack happens is often very important to mitigate the Cyber Attacks. 

True 

False  

15. A complete Intrusion Detection System requires both signature-based methods and anomaly-based procedures. 

True 

False  

16. Anomaly based IDS creates a trust-worthy activity model. 

True 

False 

17. Intrusion Prevention Systems are usually located behind a firewall to function as another filter for malicious activity. 

True 

False 

18. NIPS enhances the security of proprietary network. 

True 

False 

19. An IPS must have a file storage. 

True 

False 

20. Which of the following is correct? 

Risk=threat vulnerability 

Threat=risk vulnerability 

Vulnerability=risk +threat 

Risk=threat – vulnerability 

21. This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning. 

Port scanning 

Host scanning 

Network scanning 

Scanner 

22. Which of the following is a risk management strategy? 

Risk capacity and need determination 

Apply suitable policies and related controls 

Consider stakeholder’s perception 

All the above 

23. Security compromise in a network occurs mainly due to this. 

Intrusions  

Internet Connections 

Unauthorized Access 

Wireless Connection 

24. These are technical extension of IDS. 

Intrusion Prevention System 

Anti-Virus  

Firewall 

Anti-Malware  

25. Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits? 

Intrusion Detection System 

Intrusion Prevention System 

Vulnerability Assessment System 

Risk Management Strategy 

Leave a Comment