Cyber Security MCQ (Multiple Choice Questions)

Cyber Security MCQ: Top 25 Multiple Choice Question on Cyber Security with answers are given below.

Solved Cyber Security MCQs

1. Select the layer that compromises the components of physical and geographical network by means of data travels.

 Cyber Personal Layer

 Network Layer

 Physical Layer

 Logical Layer

2. This property refers to the intangible nature of cyber domain to provide seamless data sharing and communications.





3. Identify the type of security that protects information from illegal access or theft thereby preserving the user privacy.

 Information Security

 Cyber Security

 Network Security

 Application Security

4. Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?

 Cyber crime

 Cyber warfare


 Cyber Attack

5. Recall the attack that consumes network bandwidth and flood the networks with data.

 Protocol attack

 Volume based attack

 Application attack

 Organized attack

6. Label the serious type of Ad-hoc attack.

 Access attack

 Passive attack

 Application attack

 Malware attack

7. Figure out the action of pretending to be a licensed venture and sending fake e-mails to users.




 All the above

8. Indicate the type of attack which is used for scattering Malware.

 Drive-by download attack



 Birthday attack

9. Recognize the type of threat where one has physical access to the network with authorized account or server access.

 External threats

 Structured threats

 Internal threats

 Unstructured threats

10. Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.


 File Infectors

 Polymorphic Viruses


11. Point out the type of DoS attack where fragmented packets are sent to the target machine.


 Tear drop attack

 Ping of death attack

 Smurf attack

12. Recall the type of malwares which are basically attached to executable code or exe files.

 Macro viruses



 File infectors

13. Give examples for Ransomware.



 Smoke Leader


14. Understanding how and why the attack happens is often very important to mitigate the Cyber Attacks. 



15. A complete Intrusion Detection System requires both signature-based methods and anomaly-based procedures. 



16. Anomaly based IDS creates a trust-worthy activity model. 



17. Intrusion Prevention Systems are usually located behind a firewall to function as another filter for malicious activity. 



18. NIPS enhances the security of proprietary network. 



19. An IPS must have a file storage. 



20. Which of the following is correct? 

Risk=threat vulnerability 

Threat=risk vulnerability 

Vulnerability=risk +threat 

Risk=threat – vulnerability 

21. This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning. 

Port scanning 

Host scanning 

Network scanning 


22. Which of the following is a risk management strategy? 

Risk capacity and need determination 

Apply suitable policies and related controls 

Consider stakeholder’s perception 

All the above 

23. Security compromise in a network occurs mainly due to this. 


Internet Connections 

Unauthorized Access 

Wireless Connection 

24. These are technical extension of IDS. 

Intrusion Prevention System 




25. Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits? 

Intrusion Detection System 

Intrusion Prevention System 

Vulnerability Assessment System 

Risk Management Strategy 

Leave a Comment