25th
Dec
Dec

Cyber security MCQ
- Admin
- 25th Dec, 2020
- 875 Followers
Latest MCQ Tests
Pratice HR Questions
Cyber security MCQ Quiz
1) Wireshark is a ____________ tool.
2) Which of them is not an example of physical data leakage?
3) _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
4) Which of them do not comes under NETBIOS information?
5) You can attain a series of IP addresses allotted to a particular company using __________ site.
Download Free : Cyber security MCQ PDF
6) Which of this Nmap do not check?
7) Which of them is not a major way of stealing email information?
8) Which of the following is not a valid scanning method?
9) The ______________ intelligence gathering is non-interfering & subtle in nature.
10) Which of the following is not an email related hacking tool?
Read Best: Cyber Security Interview Questions
11) What is the sequence of a TCP connection?
12) Network Stumbler is a Windows Wi-Fi monitoring tool.
13) Data leakage is popularly known as ___________
14) _________ framework made cracking of vulnerabilities easy like point and click.
15) Which of them is an example of physical data leakage?
Download Free: Cyber Security Interview Questions PDF
16) Keyloggers are a form of ______________.
17) Using spyware is an example of _________ type of information gathering.
18) Brute force attack is ______________
19) Which of the following is not an advantage of dictionary attack?
20) Which database is queried by Whois?
21) Which 2 protocols are used in the Transport layer of the TCP/IP model?
22) Which of the following tool is used for Blackjacking?
23) Which of them is not a standard flag used in TCP communication between client and server?
24) A packet with no flags set is which type of scan?
25) __________ is a debugger and exploration tool.
26) _____________ helps in protecting corporate data, communications and other assets.
27) Which of the following do not comes under security measures for cloud in firms?
28) Spywares can be used to steal _______________ from the attacker’s browser.
29) Which form of encryption does WPA use?
30) Which of the following is not a step of data-loss prevention?
31) Services running on a system are determined by _____________.
32) TCP/IP is composed of _______ number of layers.
33) Which of this Nmap do not check?
34) Ping sweep is also known as ________________
35) There are __________ different versions of IP popularly used.
36) Why would a hacker use a proxy server?
37) What are the types of scanning?
38) Why would HTTP Tunneling be used?
39) Which of the following is an example of physical layer vulnerability?
40) Which of them is not a scanning methodology?
41) Why would a ping sweep be used?
Leave A Comment :
Valid name is required.
Valid name is required.
Valid email id is required.