25th
Dec
Cyber security MCQ

Cyber security MCQ

  • Admin
  • 25th Dec, 2020
  • 875 Followers

Cyber security MCQ Quiz

1) Wireshark is a ____________ tool.

  • A. network connection security
  • B. network protocol analysis
  • C. connection analysis
  • D. defending malicious packet-filtering

2) Which of them is not an example of physical data leakage?

  • A. dumpster diving
  • B. shoulder surfing
  • C. printers and photocopiers
  • D. phishing

3) _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.

  • A. Data stolen software
  • B. Data loss measurement
  • C. Data loss prevention
  • D. Data leak prevention

4) Which of them do not comes under NETBIOS information?

  • A. Name of the system / PC
  • B. MAC address
  • C. RAM space
  • D. Workgroup name

5) You can attain a series of IP addresses allotted to a particular company using __________ site.

  • A. https://www.goipaddr.net/
  • B. https://www.ipip.com/
  • C. https://www.ipdata.org/
  • D. https://www.arin.net/
Download Free : Cyber security MCQ PDF

6) Which of this Nmap do not check?

  • A. on what OS they are running
  • B. what kind of firewall is in use
  • C. what type of antivirus is in use
  • D. on what OS they are running

7) Which of them is not a major way of stealing email information?

  • A. Stealing cookies
  • B. Password Phishing
  • C. Reverse Engineering
  • D. Social Engineering

8) Which of the following is not a valid scanning method?

  • A. Xmas Tree scan
  • B. SYN Stealth scan
  • C. Cloud scan
  • D. Null Scan

9) The ______________ intelligence gathering is non-interfering & subtle in nature.

  • A. competitive
  • B. cognitive
  • C. cyber
  • D. concrete

10) Which of the following is not an email related hacking tool?

  • A. Email Finder Pro
  • B. Mail Password
  • C. Sendinc
  • D. Mail PassView

11) What is the sequence of a TCP connection?

  • A. SYN-ACK-FIN
  • B. SYN-ACK
  • C. SYN-SYN-ACK
  • D. SYN-SYN ACK-ACK

12) Network Stumbler is a Windows Wi-Fi monitoring tool.

  • A. True
  • B. False

13) Data leakage is popularly known as ___________

  • A. low and slow data theft
  • B. data crack
  • C. data theft
  • D. slow data theft

14) _________ framework made cracking of vulnerabilities easy like point and click.

  • A. Net
  • B. Zeus
  • C. Ettercap
  • D. Metasploit

15) Which of them is an example of physical data leakage?

  • A. Phishing
  • B. MiTM
  • C. Dumpster diving
  • D. DDoS

16) Keyloggers are a form of ______________.

  • A. Social engineering
  • B. Shoulder surfing
  • C. Spyware
  • D. Trojan

17) Using spyware is an example of _________ type of information gathering.

  • A. active & passive
  • B. active
  • C. passive
  • D. non-passive

18) Brute force attack is ______________

  • A. slow
  • B. complex to understand
  • C. fast
  • D. inefficient

19) Which of the following is not an advantage of dictionary attack?

  • A. Very fast
  • B. Time-saving
  • C. Easy to perform
  • D. Very tough and inefficient

20) Which database is queried by Whois?

  • A. ARIN
  • B. APNIC
  • C. ICANN
  • D. DNS

21) Which 2 protocols are used in the Transport layer of the TCP/IP model?

  • A. TCP and UDP
  • B. UDP and HTTP
  • C. HTTP and TCP
  • D. ICMP and HTTP

22) Which of the following tool is used for Blackjacking?

  • A. BBAttacker
  • B. Blackburried
  • C. BBProxy
  • D. BBJacking

23) Which of them is not a standard flag used in TCP communication between client and server?

  • A. Start
  • B. Acknowledgment
  • C. Synchronize
  • D. Finish

24) A packet with no flags set is which type of scan?

  • A. IDLE
  • B. XMAS
  • C. NULL
  • D. TCP

25) __________ is a debugger and exploration tool.

  • A. Netdog
  • B. Tcpdump
  • C. Netcat
  • D. BackTrack

26) _____________ helps in protecting corporate data, communications and other assets.

  • A. Wireshark
  • B. Snort
  • C. Burp Suit
  • D. CipherCloud

27) Which of the following do not comes under security measures for cloud in firms?

  • A. Antivirus
  • B. Encryption
  • C. Load Balancer
  • D. Firewall

28) Spywares can be used to steal _______________ from the attacker’s browser.

  • A. company details
  • B. plug-ins used
  • C. browsing history
  • D. browser details

29) Which form of encryption does WPA use?

  • A. AES
  • B. TKIP
  • C. Shared key
  • D. LEAP

30) Which of the following is not a step of data-loss prevention?

  • A. Manage
  • B. Classify
  • C. Identify
  • D. Discover

31) Services running on a system are determined by _____________.

  • A. The system’s IP address.
  • B. The port assigned
  • C. The system’s network name
  • D. The Active Directory

32) TCP/IP is composed of _______ number of layers.

  • A. 4
  • B. 2
  • C. 3
  • D. 5

33) Which of this Nmap do not check?

  • A. on what OS they are running
  • B. what type of antivirus is in use
  • C. services different hosts are offering
  • D. what kind of firewall is in use

34) Ping sweep is also known as ________________

  • A. ICMP Call
  • B. IGMP Sweep
  • C. ICMP pinging
  • D. ICMP Sweep

35) There are __________ different versions of IP popularly used.

  • A. 3
  • B. 4
  • C. 2
  • D. 5

36) Why would a hacker use a proxy server?

  • A. To create a stronger connection with the target.
  • B. To hide malicious activity on the network.
  • C. To create a ghost server on the network.
  • D. To obtain a remote access connection.

37) What are the types of scanning?

  • A. Passive, active, and interactive
  • B. Server, client, and network
  • C. Port, network, and services
  • D. Network, vulnerability, and port

38) Why would HTTP Tunneling be used?

  • A. . Web activity is not scanned
  • B. HTTP is a easy protocol to work with
  • C. To identify proxy servers
  • D. To bypass a firewall

39) Which of the following is an example of physical layer vulnerability?

  • A. Keystroke & Other Input Logging
  • B. Route spoofing
  • C. MAC Address Spoofing
  • D. Weak or non-existent authentication

40) Which of them is not a scanning methodology?

  • A. Identifying of services
  • B. Identifying the malware in the system
  • C. Check for live systems
  • D. Check for open ports

41) Why would a ping sweep be used?

  • A. To identify live systems
  • B. To identify open ports
  • C. To locate live systems
  • D. To locate firewalls

Leave A Comment :

Valid name is required.

Valid name is required.

Valid email id is required.

Related MCQ/Quiz

01st
Dec
Laravel MCQ
01st
Dec
React JS MCQ
01st
Jan
AngularJs MCQ
01st
Jul
Node js MCQ
01st
Jul
Angular 2 MCQ
01st
Jul
JSON MCQ