GkSeries.com

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

(1) How can cookies be used to mitigate cross-site scripting?
[A] Cookies can be coded like a program to intercept script attacks.
[B] Cookies store an exact mirror copy of all a users web activity.
[C] Cookies allow for cookie-based user authentication.
[D] They can't. Cookies only store user information.
Answer: Cookies allow for cookie-based user authentication.
(2) Which of the following uses asymmetric cryptography ?
[A] VoIP
[B] SSL
[C] Both VoIP and SSL
[D] None of these
Answer: Both VoIP and SSL

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Which of the following is not a VALID type of firewall?
[A] Application-level gateways
[B] Circuit-level gateways
[C] Proxy Server Gateways
[D] Packet filters
Answer: Proxy Server Gateways
(4) What is the less secure AES encryption mode?
[A] CFB
[B] OCB
[C] ECB
[D] CBC
Answer: CBC
(5) What is a method to fend off a Sockstress attack?
[A] Do nothing. It will pass on its own.
[B] Prepare a retaliatory DDOS attack
[C] Black-listing access to TCP services on critical systems
[D] White-listing access to TCP services on critical systems.
Answer: White-listing access to TCP services on critical systems.
(6) Which of the following HTTP method is considered insecure ?
[A] POST
[B] DELETE
[C] TRACE
[D] GET
Answer: TRACE
(7) Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
[A] Private key transport key
[B] Public signature verification key
[C] Private ephemeral key agreement key
[D] Public authentication key
Answer: Private ephemeral key agreement key
(8) What does the Linux kernal use to sandbox running programs?
[A] Linux doesn't sandbox because it is impervious to any and all cyber attacks
[B] Linux uses a layered system of user authentication to perform sandbox-like functions.
[C] seccomp, or Secure Computing Mode
[D] Linux drives are fully encrypted, thus they don't need sandboxing.
Answer: seccomp, or Secure Computing Mode
(9) Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
[A] Public ephemeral key agreement key
[B] Asymmetric random number generation keys
[C] Symmetric random number generation keys
[D] Private ephemeral key agreement key
Answer: Private ephemeral key agreement key
(10) What does a cryptographic key do within the Internet Layer?
[A] It specifies how encrypted data is transferred and to whom.
[B] It specifies how transferred information is converted into cyphertext.
[C] It converts it into encrypted language.
[D] It is the specialized dataset that is able to decrypt cyphertext.
Answer: It specifies how transferred information is converted into cyphertext
(11) What is the difference between a worm and virus?
[A] A worm does not replicate itself like a virus does, but rather moves from computer to computer
[B] A virus infects files, while a worm eats them
[C] A worm is a virus created for a very specific purpose
[D] Unlike a virus, a worm does not need to attach itself to a program to spread.
Answer: Unlike a virus, a worm does not need to attach itself to a program to spread.
(12) Which of the following represents a cryptographic key that is intended to be used for a long period of time?
[A] Private key transport
[B] key Public authentication
[C] signature verification key
[D] Private static key agreement key
Answer: Private static key agreement key
(13) Which of the following is a VALID ephemeral key?
[A] Asymmetric ephemeral random number generation keys
[B] Public ephemeral verification key
[C] Symmetric ephemeral random number generation keys
[D] Public ephemeral key agreement key
Answer: Public ephemeral key agreement key
(14) Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
[A] Public Key Infrastructure
[B] Virtual Key Infrastructure
[C] Private Key Infrastructure
[D] All of the given options are correct
Answer: Public Key Infrastructure
(15) Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
[A] Symmetric random number generation keys
[B] Asymmetric random number generation keys
[C] Symmetric key wrapping key
[D] Public signature verification key
Answer: Symmetric key wrapping key
(16) Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
[A] Symmetric random number generation keys
[B] Asymmetric random number generation keys
[C] Symmetric key wrapping key
[D] Public signature verification key
Answer: Symmetric key wrapping key
(17) Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
[A] Virus
[B] Spyware
[C] Fraudtool
[D] Malware
Answer: Fraudtool
(18) In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections? session layer application layer
[A] presentation layer
[B] Both session and presentation layer
[C] session layer
[D] application layer
Answer: application layer
(19) Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
[A] Public signature verification key
[B] Private signature key
[C] Public key transport key
[D] Private key transport key
Answer: Public key transport key
(20) Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
[A] Private signature key
[B] Private key transport key
[C] Public signature verification key
[D] Public authentication key
Answer: Private key transport key

Please share this page

Click Here to Read more questions

Teacher Eligibility Test