Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
How can cookies be used to mitigate cross-site scripting?
[A]
Cookies can be coded like a program to intercept script attacks.
[B]
Cookies store an exact mirror copy of all a users web activity.
[C]
Cookies allow for cookie-based user authentication.
[D]
They can't. Cookies only store user information.
Answer: Cookies allow for cookie-based user authentication.
(2)
Which of the following uses asymmetric cryptography ?
[A]
VoIP
[B]
SSL
[C]
Both VoIP and SSL
[D]
None of these
Answer: Both VoIP and SSL
(3)
Which of the following is not a VALID type of firewall?
[A]
Application-level gateways
[B]
Circuit-level gateways
[C]
Proxy Server Gateways
[D]
Packet filters
Answer: Proxy Server Gateways
(4)
What is the less secure AES encryption mode?
[A]
CFB
[B]
OCB
[C]
ECB
[D]
CBC
(5)
What is a method to fend off a Sockstress attack?
[A]
Do nothing. It will pass on its own.
[B]
Prepare a retaliatory DDOS attack
[C]
Black-listing access to TCP services on critical systems
[D]
White-listing access to TCP services on critical systems.
Answer: White-listing access to TCP services on critical systems.
(6)
Which of the following HTTP method is considered insecure ?
[A]
POST
[B]
DELETE
[C]
TRACE
[D]
GET
(7)
Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
[A]
Private key transport key
[B]
Public signature verification key
[C]
Private ephemeral key agreement key
[D]
Public authentication key
Answer: Private ephemeral key agreement key
(8)
What does the Linux kernal use to sandbox running programs?
[A]
Linux doesn't sandbox because it is impervious to any and all cyber attacks
[B]
Linux uses a layered system of user authentication to perform sandbox-like functions.
[C]
seccomp, or Secure Computing Mode
[D]
Linux drives are fully encrypted, thus they don't need sandboxing.
Answer: seccomp, or Secure Computing Mode
(9)
Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
[A]
Public ephemeral key agreement key
[B]
Asymmetric random number generation keys
[C]
Symmetric random number generation keys
[D]
Private ephemeral key agreement key
Answer: Private ephemeral key agreement key
(10)
What does a cryptographic key do within the Internet Layer?
[A]
It specifies how encrypted data is transferred and to whom.
[B]
It specifies how transferred information is converted into cyphertext.
[C]
It converts it into encrypted language.
[D]
It is the specialized dataset that is able to decrypt cyphertext.
Answer: It specifies how transferred information is converted into cyphertext
(11)
What is the difference between a worm and virus?
[A]
A worm does not replicate itself like a virus does, but rather moves from computer to computer
[B]
A virus infects files, while a worm eats them
[C]
A worm is a virus created for a very specific purpose
[D]
Unlike a virus, a worm does not need to attach itself to a program to spread.
Answer: Unlike a virus, a worm does not need to attach itself to a program to spread.
(12)
Which of the following represents a cryptographic key that is intended to be used for a long period of time?
[A]
Private key transport
[B]
key Public authentication
[C]
signature verification key
[D]
Private static key agreement key
Answer: Private static key agreement key
(13)
Which of the following is a VALID ephemeral key?
[A]
Asymmetric ephemeral random number generation keys
[B]
Public ephemeral verification key
[C]
Symmetric ephemeral random number generation keys
[D]
Public ephemeral key agreement key
Answer: Public ephemeral key agreement key
(14)
Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
[A]
Public Key Infrastructure
[B]
Virtual Key Infrastructure
[C]
Private Key Infrastructure
[D]
All of the given options are correct
Answer: Public Key Infrastructure
(15)
Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
[A]
Symmetric random number generation keys
[B]
Asymmetric random number generation keys
[C]
Symmetric key wrapping key
[D]
Public signature verification key
Answer: Symmetric key wrapping key
(16)
Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
[A]
Symmetric random number generation keys
[B]
Asymmetric random number generation keys
[C]
Symmetric key wrapping key
[D]
Public signature verification key
Answer: Symmetric key wrapping key
(17)
Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
[A]
Virus
[B]
Spyware
[C]
Fraudtool
[D]
Malware
(18)
In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections? session layer application layer
[A]
presentation layer
[B]
Both session and presentation layer
[C]
session layer
[D]
application layer
Answer: application layer
(19)
Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
[A]
Public signature verification key
[B]
Private signature key
[C]
Public key transport key
[D]
Private key transport key
Answer: Public key transport key
(20)
Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
[A]
Private signature key
[B]
Private key transport key
[C]
Public signature verification key
[D]
Public authentication key
Answer: Private key transport key
Please share this page